Was Your Data Compromised by Equifax? Better Act Fast!

January 17th, 2020

Two billion dollars sure does sound like a lot of money for a class action lawsuit, but when you are a major credit reporting agency whose negligence compromised over 147 million people’s personal information? It’s really not.  Click here to file a claim free, online, if you were a potential victim of the massive Equifax […]

Authenticate Your Google Account With Your iPhone

January 16th, 2020

Among all the security features available today, two-factor authentication (2FA) is by far one of the most important, and apparently, Google is aware of that!  In their most recent iOS “Smart Lock” app update, they included a feature that will allow you to use your iPhone as a physical 2FA device.  After you set it […]

Microsoft’s Comprehensive End of Support List for 2020

January 14th, 2020

I know you are all aware of what I’m about to tell you, but just in case you momentarily forgot, I’m going to refresh your memory… Every year, Microsoft stops supporting select versions of its software.  What this means is that they discontinue any sort of security updates or patches.   What does this mean for […]

Just How Not “HIPAA Mandatory” Is Encryption?

January 8th, 2020

In case you were ever wondering if your practice needs to encrypt its ePHI? Let the $3 million HIPAA penalty paid last month by the University of Rochester Medical Center (URMC), one of the largest medical systems in NY State, serve as a warning. The Department of Health and Human Services’ Office for Civil Rights […]

FBI Warns Business Owners: Beware of Increasing Maze Attacks

January 8th, 2020

Directly on the heels of LockerGoga and MegaCortex, a different strand of ransomware, Maze, which was first discovered nearly a year ago, started to target private companies in the US in November, and the FBI wants to make sure you know about it. Just two days after issuing an alert for LockerGoga and MegaCortex, the […]

Twitter Vulnerability Exposed in a Big Way

December 26th, 2019

Ibrahim Balic, a security researcher, recently exposed a flaw in Twitter’s app that allowed to match unique Twitter user accounts with 17 million phone numbers months ago.  He was able to accomplish this by uploading large lists of phone numbers by way of Twitter’s “Contacts Upload” feature that is available on the social media giant’s […]

Ransomware Attack Shuts Down New Orleans

December 14th, 2019

It seems like something that only happens in movies and TV shows: It’s Friday the 13th.  You, your colleagues, your entire department, the entire city, in fact, receives the same command to power down their computers immediately and disconnect all devices from the network. But this wasn’t a movie and it wasn’t a TV show… […]

Sentara Doubled Down When They Should Have Folded

December 10th, 2019

“Eight is Enough” A great, wholesome, family show from the late 70’s and early 80’s.  Also: what Sentara Hospital, with over 300 facilities across the states of North Carolina and Virginia, is telling the Department of Health and Human Services’ Office for Civil Rights (OCR) after being on the receiving end last month of this […]

Russian Hackers Hold Nursing Home Patients’ Data Ransom for $14M

December 9th, 2019

There is a reason hackers have started targeting hospitals and medical practices.  Not only is their cyber security known to be woefully lacking (despite the best efforts of the U.S. Department of Health and Human Services [HHS] and HIPAA regulations), but the electric Patient Health Information (ePHI) can literally be life and death.  Meaning?  The […]

Cyborg Ransomware Delivers Via Fake ‘Windows Update’ Email

December 9th, 2019

Researchers at Trustwave recently discovered a malicious spam campaign.  The email comes as an executable file via email with a tell-tale two sentence subject line that reads “Install Latest Microsoft Windows Update now! Critical Microsoft Windows Update!” There is only one sentence to the actual email itself. Disguised as a .jpg, the file really contains […]

Looting Adds Insult to Injury for Durham Clinic

November 19th, 2019

Looters broke into a Durham health clinic sometime after the downtown gas explosion on April 10th that affected over 20 businesses, injured 25 people, and caused the death of two people. The subsequent theft of clinic property has prompted the clinic to notify patients that their information, including diagnoses and treatment information may have been […]

PureBasic-based Ransomware Discovered

November 14th, 2019

PureLocker, an unusual form of ransomware that attacks enterprise servers, has gone undetected for some time but has recently been revealed by cybersecurity analysts at Intezer and IBM X-Force.  What makes PureLocker so unique is that it’s written in PureBasic programming language.  Malicious software written in PureBasic is difficult for most security systems to detect.  […]

HIPAA Violations Top $100 Billion

November 13th, 2019

HIPAA Violations have been making headlines recently, and for good reason. Fines for violations can be crippling to companies, and the more mobile our data becomes, the greater the risk for security breech. According to the Health and Human Services website, as of September 30, 2019 the OCR has settled or imposed a civil money […]

“Project Nightingale” Raises Data Security Concerns

November 13th, 2019

Ascension is sharing private healthcare information with Google.  The project, dubbed “Project Nightingale,” was put into play to help Ascension centralize its patient database for the over 2600 hospitals in its healthcare system.  Patient information, including names, test results, and dates of birth are also being collected by Google to help develop a new software […]

Social Media Ad Spend Rising to Third Largest Advertising Channel

November 13th, 2019

Global social media ad spending is projected to grow by as much as 20% this year, bringing it up to the number three slot of largest advertising channels according to Zenith’s Advertizing Expenditure Forecast. Zenith is a media ad agency parented by Publicis Media. $84 billion is slated for global social media spending, exceeding print […]

Encryption Breaking Malware “Reductor” Threatens Windows Users

October 8th, 2019

Researchers at Kaspersky have uncovered a new highly sophisticated, high impact malware threat that breaks encryption:  Reductor.  According to the researchers, the malware “compromises encrypted web communications in an impressive way” and gives the threat actors behind it “capabilities that few other actors in the world have.” Reductor compromises the encrypted HTTPS communication, which enables […]

FBI Releases Malware Threat Warning

October 5th, 2019

The Federal Bureau of Investigation (FBI) released a warning to U.S. businesses and organizations Wednesday regarding high-impact threats across the country.  Numerous cyberattacks have been documented recently involving ransomware.  Despite the ever-evolving attack strategies, the FBI highlights three main attack techniques that are being used by criminals to avoid detection and infiltrate businesses and organizations: […]

Autumn Aperture: Don’t Enable Macros

October 5th, 2019

According to Danny Adamitis and Elizabeth Wharton from Prevailion, spear phishing emails have been targeting the U.S. utilizing an obscure file format to beat antiviral software.  They call this campaign “Autumn Aperture”.  Attackers are sending word documents to recipients with content specialized to the victim’s recent activities.  This level of specialization results in a significantly […]

Malware Attack Closes Alabama Hospitals

October 2nd, 2019

Not one but THREE hospitals in the DCH Health System in Alabama are unable to accept new patients today due to ransomware: DCH Regional Medical Center in Tuscaloosa, Northport Medical Center in Northport, and Fayette Medical Center.  Cybercriminals have demanded an undisclosed amount of money for the unlock code. “A criminal is limiting our ability […]

‘Checkm8’: A Permanent Bootrom Vulnerability

September 30th, 2019

A security researcher who goes by the Twitter handle “axi0mX” announced on Friday that there is a permanent Bootrom vulnerability “checkm8” in Apple iOS.  The flaw enables bypassing the security protections present in most Apple mobile devices.  Downside: cannot be patched.  Upside: physical access is needed  to exploit it and a system restart erases any […]