Locky Surge

November 1st, 2016

Lockedcomputer

Over the past week over 14 million emails have been sent out in a new campaign with the purpose of spread the Locky strain of ransomware. As we’ve reported many times, once Locky takes control it then encrypts a victim’s files and demands payment in Bitcoins to get a key to unlock them, typically around […]

How to Keep Your Stuff From Attacking Everyone Else

October 25th, 2016

Iot

You probably heard about the massive DDoS attack that took out swaths of the internet this weekend.  It happened because hackers were able to hijack unsecured surveillance systems and routers from around the world and put them to use overloading websites.  If you have any internet-enabled devices, they could be used in some nefarious hacker […]

How Hackers Got Podesta’s and Powell’s Emails

October 24th, 2016

Cyberthief Sc

As we all know, WikiLeaks has been publishing embarrassing emails from the inner circle of Hillary Clinton’s presidential campaign, with the most recent coming from the personal email of John Podesta. The US government and security firms all believe it was the work of hackers acting on the orders of the Russian government, but the […]

Yahoo Canceled Earnings Call

October 20th, 2016

Yahoo

Yahoo released their earnings statement on Tuesday, but took the unusual step of skipping out on a conference call to discuss the earnings. The way it usually works is that a company will release their earnings statement than get on a call with analysts, investors, reporters and various other interested parties for a Q&A session. […]

There Are 5761 Online Stores Currently Infected with Card-Data-Stealing Malware

October 19th, 2016

Securitytext

Recently there has been some particular insight and knowledge given to the fact that there are more that 5,761 online stores that are currently affected with card data stealing malware. In particular the number of online shops that are infected with malware has skyrocketed in the past year according to William de Groot in particular […]

Nuclear Power Plant Attacked

October 17th, 2016

Nuclearpowerplant

Since the Chernobyl incident, everyone has known the dangers of a malfunctioning nuclear power plant.  With the rise of cyberattacks, experts have warned whoever would listen about potential vulnerabilities with nuke plants.  It turns out that such worries were well founded. The International Atomic Energy Agency announced that a nuclear power plant has already been […]

Cyberattack Supply and Demand

October 13th, 2016

Ransomwarekeymoney

Everyone knows the law of supply and demand: when a resource is scarce, the price is high.  When the market is glutted, the price falls.  The internet black market is no different. It appears that cybercriminals have flooded the market with Electronic Health Records (EHR) and have forced their value down to the degree that […]

Aetna Sets Pace for Healthcare Cybersecurity

October 13th, 2016

Aetna

Whenever there’s a big data dump, the security experts at Aetna jump on it and use analytics to scan and identify any credentials that are the same as those of a current user. A match means there’s an opportunity for hackers to take advantage of those credentials. The team immediately forces a password reset and […]

Yahoo’s Price Drop

October 13th, 2016

Yahoo

It appears that Verizon is looking to get at least a $1 billion discount on its acquisition of Yahoo. Originally they were hoping to buy the company and merge it with AOL to compete with Google and Facebook, but the recent revelations involving hacking and spying have Verizon wary. Two week ago Yahoo admitted that […]

Mac Webcam Spyware

October 12th, 2016

Apple

Unfortunately for Mac users that believe their computers to be safer than one running Windows there a new piece of malware that is adding to the mounting evidence that that is no longer true. This particular program allows hackers to monitor and record video or audio using the built in camera and microphone without the […]

Romanian Hacker Stole $2 Million from ATMs

October 12th, 2016

Romainianhacker

A Romanian man has been arrested in that country by City of London Police working on the London Regional Fraud Team. The man, Emanual Leahu, has been charged for his participation in a campaign involving ATM malware. Authorities believe Leahu to be part of a European hacking gang. The thieves broke into ATMs and installed […]

Government Infiltrated Yahoo

October 11th, 2016

Yahoo

According to reports, Yahoo developed software in order to scan the emails of hundreds of millions of its users on behalf of US intelligence services. Additionally, installing this software appears to be the result of a Foreign Intelligence Surveillance Act (FISA) court order. The program was originally designed to scan for child pornography and emails […]

Turkey Censoring Google, Microsoft and More

October 10th, 2016

Turkeyflag

Turkey’s reputation is less than sterling when it comes to censorship.  Their latest foray into censorship targets cloud storage services and information hosting services including Dropbox, GitHub, Google Drive and Microsoft OneDrive. Most of the affected sites were returning SSL errors, which points to traffic being intercepted one some macro level, such as the national level. […]

Russia Didn’t Only Hack the DNC

October 10th, 2016

Russiandempub

Last week, the United States formally accused Russia for cyberattacks involving the Democratic Party.  It looks like the hack was actually much deeper than that, involving Republicans as well, and targeting people whose work the Russian government considers strategically important, and it’s been going on for longer than initially suspected. The hacking appears to mostly […]

Formal Accusation: Russia Cyberattacked US

October 8th, 2016

Usvrussia

The US government has formally accused Russia of recent cyberattacks.  The Obama administration claims confidence that the Russian government was behind the attacks that targeted the Democratic Party, which may have been an attempt to interfere in the upcoming presidential election.  Russia has denied the claims. The statement was released by the Department of Homeland […]

How to Protect Your Router

October 8th, 2016

Routerprotect

Think about how integral a router is to a modern home.  It provides internet for your computers, wifi for your mobile devices and, increasingly, helps control thermostats, refrigerators, security cameras, lights and just about anything else electrical.  You can even order products you’re low on by pushing a button, all from the internet-magic of your […]

Data on 6,700 Health Workers Vulnerable

October 8th, 2016

Hhs

It looks like there could have been another hack of federal employee records.  This time the Health and Human Services Department is checking into the possibility of a hack compromising the data of 6,700 doctors, nurses and other health workers under the Surgeon General. A problem was discovered in the system on September 20.  It’s been fixed, […]

Is Your Clients’ Confidential Data Secure?

October 6th, 2016

petronella

From Progressive Law Practice: Since legal matters necessarily involve the client sharing sensitive financial and personal information with their lawyer and support staff, the attorney should ensure the client understands: Who from the firm may communicate with the client to obtain the information Appropriate methods for disseminating information to the law firm The steps the […]

Snowden Part II

October 6th, 2016

Nsabuilding

Everyone has heard of Edward Snowden, the NSA contractor who leaked documents detailing NSA secrets.  Some hail him as a hero, some call him a traitor.  And now, the NSA has arrested another contractor for data theft. Harold Thomas Martin was contracted to the NSA through Booz Allen Hamilton, the same firm that employed Snowden.  Martin […]

Free Download: 68 Million Dropbox Accounts!

October 5th, 2016

Dropbox

You may remember a few months ago when we reported that 68,680,741 Dropbox accounts had been compromised.  You could buy all that information for $1200 as of last month, but now you can get it for free. The password information was uploaded to a website run by Thomas White, who goes by the handle Cthulhu.  He […]