Archive for the ‘Cyber Security’ Category
Wednesday, August 10th, 2016
In the month of July, one hacker going by the handle TheDarkOverlord made up 30% of all data breaches. He also had the largest breach with 23,565 records being put on the Dark Web for sale. Even more surprising is that on average it took two years before a breach was reported, and in one […]
Posted in Blog, Cyber Security | Comments Off on Recent Staggering Healthcare Data Breach Numbers
Tuesday, August 9th, 2016
A new type of malware has been discovered by researchers that is so advanced it probably was developed by a nation-state and has been active for years without anyone noticing. Going by both ProjectSauron and Remsec depending on who you talk to, the malware platform has been around since at least 2011 and has affected […]
Posted in Blog, Cyber Security | Comments Off on Advanced Malware, ProjectSauron, Undetected for Years
Monday, August 8th, 2016
One of the providers of insurance ID cards for carriers such as BlueCross BlueShield, Newkirk Products, has been the victim of a data breach. While no health plan systems were affected, the personal data of 3.3 million insurance plan members may have been exposed. Newkirk discovered that one of their servers had been accessed without […]
Posted in Blog, Cyber Security | Comments Off on 3.3 Million Victims in BCBS Associate Hack
Monday, August 8th, 2016
The software company Oracle has become the latest victim of a Russian organized cybercriminals. The hackers have found a way to compromise the customer support portal for hundreds of Oracle’s MICROS point-of-sale (PoS) credit card payment systems. Servicing over 330,000 cash registers, MICROS is one of the top PoS in the world. With the breach […]
Posted in Blog, Cyber Security | Comments Off on Oracle Data Breach
Monday, August 8th, 2016
If you see a penny pick it up. If you see a USB device, throw it away! Or at the very least, DO NOT STICK IT IN YOUR COMPUTER!! USB sticks are the easiest way for hackers to get malware on your computer. Elie Bursztein, a Google anti-abuse team researcher, recently conducted a study in […]
Posted in Blog, Cyber Security | Comments Off on About that USB Drive You Found…
Monday, August 8th, 2016
Unfortunately for Android fans, a new security flaw has be discovered. Found in the software of tens of millions of phones, this flaw allows hackers to get complete access the user’s data. The vulnerabilities were discovered by security researchers at Checkpoint after six months of reverse engineering the code being run by Qualcomm chipsets. About […]
Posted in Blog, Cyber Security | Comments Off on Flaw in 900 Million Android Phones
Monday, August 8th, 2016
Going inside a gas station just to purchase has has become all but obsolete for many of us… And when is the last time you paid for gas with cash? While paying at the pump with your card is convenient, it has just become much less secure. According to police in North Dallas, at least […]
Posted in Blog, Cyber Security | Comments Off on Gas Pump Scam Steals Info via Bluetooth
Monday, August 8th, 2016
The general feeling by the American public is that it’s probably not out of the realm of possibility for the NSA to be stockpiling unknown security vulnerabilities, and with the mysterious agency spending $25 million dollars a year on Zero Day vulnerabilities, that would seem to be the case. However, according to a researcher from […]
Posted in Blog, Cyber Security | Comments Off on The NSA’s Zero Days
Monday, August 8th, 2016
With the Brazilian government mobilizing 85,000 armed soldiers and police, security at the Olympic Games in Rio is obviously a priority. Unfortunately, one of the biggest threats may not be on the ground, it may actually come from the internet. According to the cybersecurity firm Fortinet, there has been a dramatic 83% increase in malicious […]
Posted in Blog, Cyber Security | Comments Off on Olympic Cybercrime
Friday, August 5th, 2016
iOS devices are known for their security, but where there’s a will, there’s a way. One convenience of owning an iOS device is the ability to track your phone or tablet using Apple’s “Find iPhone” app. If you’re unable to find your device, you can use the app (either on a computer or another iPhone/iPad), to ping your lost […]
Posted in Blog, Cyber Security | Comments Off on iPhone/iPad Users Change Apple ID Password NOW
Friday, August 5th, 2016
Zero Days is a Sci-Fi adventure film, filled with action, adventure and cyber espionage! And it also happens to be true. This documentary by filmmaker Alex Gibney cannot be missed. If you think you know malware, think again. Stuxnet Stealing a person’s identity is a hack that would make Stuxnet laugh. Without giving too much […]
Posted in Blog, Cyber Security | Comments Off on Zero Days or Stuxnet the Movie
Thursday, August 4th, 2016
After being launched in May of last year, many people have been under the impression that the HTTP/2 is more secure than the more common HTTP. Google even started bundling it with its SPDY protocol in an effort to speed up web surfing. Unfortunately, data security researchers at Imperva have published a report outlining four […]
Posted in Blog, Cyber Security | Comments Off on Major Vulnerabilities in HTTP2
Tuesday, August 2nd, 2016
Phishing has gone to a whole new level as cybercriminals have started sending emails from legitimate PayPal accounts with fake money requests and links to malicious websites. Most likely using compromised PayPal email accounts, the enterprising hackers are getting unsuspecting victims to send them money. Just as bad or worse, however, is the link in […]
Posted in Blog, Cyber Security | Comments Off on Legit PayPal Email Contains Malicious Link
Monday, August 1st, 2016
By now everyone has heard of the DNC leak, which some are blaming on Russian hackers. That could be just the beginning of a foreign power interfering in the electoral process of the United States though. The next possible big target? Voting machines. Voting machines are already a susceptible target owing to the fact that […]
Posted in Blog, Cyber Security | Comments Off on Will Russian Hackers Target Voting Machines?
Thursday, July 28th, 2016
Many small business owners are living in the past, and it is to their detriment. That is because over the last four years, hackers have begun to increase their attacks on small businesses exponentially. In fact, the number of attacks actually tripled from 2011 to 2012, and there has been a sharp increase even in […]
Posted in Blog, Cyber Security | Comments Off on Don’t Let Your Business be a Target
Thursday, July 28th, 2016
When Apple first came out with its Touch ID on the iPhone 5, it was like owning a piece of the future. The popularity of biometrics (using a person’s unique attributes for identification purposes, such as fingerprints and retinas) has been quickly increasing; in fact, it is estimated that biometrics will grow into a $25 […]
Posted in Blog, Cyber Security | Comments Off on Biometrics: Convenience or Risk?
Wednesday, July 27th, 2016
A password cracking specialist has built a beast of a computer that has the ability to attempt upwards of 350 billion passwords a second. For those of you keeping count, this means it can guess every possible Windows password within six hours. The Linux-based machine has five servers and utilizes the Virtual OpenCL cluster platform […]
Posted in Blog, Cyber Security | Comments Off on Every Windows Password Can be Cracked Within Six Hours
Wednesday, July 27th, 2016
If you are using a cheap wireless keyboard, you run the risk of having your passwords stolen. According to researchers at the security company, Bastille, there’s a security hole in millions of keyboards that can allow hackers see every keystroke from up to 100 meters away. After testing wireless keyboards put out by a dozen […]
Posted in Blog, Cyber Security | Comments Off on Stolen Passwords from Wireless Keyboards
Wednesday, July 27th, 2016
Millions of people use LastPass to store passwords for all their various accounts. It’s a great idea, because it can be difficult to come up with different, strong passwords, never mind memorizing them for each website you log into. Unfortunately, a zero day vulnerability has been discovered in LastPass’s cloud vault. A zero day vulnerability […]
Posted in Blog, Cyber Security | Comments Off on LastPass Vulnerability Could Give Hackers All Your Passwords
Tuesday, July 26th, 2016
WikiLeaks’ crusade of radical transparency is in some respects a noble one, but there are occasions when innocent people are affected. The release of over 19,000 emails from top US Democratic National Committee members is one of those occasions. Included in the correspondence is personal donor information that includes names, home and email addresses, phone, […]
Posted in Blog, Cyber Security | Comments Off on Innocent Bystanders of DNC WikiLeak