Seven Tips to Avoid Being Victimized by a Data Breach

June 29th, 2016

At the time of this writing, one hacker claims to have stolen information from three healthcare databases totaling up to around 655,000 patient records.  The information includes full names, Social Security numbers, dates of birth, mailing addresses, email addresses, phone numbers, race, gender and insurance account info. All of this information is now for sale […]

Mobile Phone Account Hijacking

June 28th, 2016

By hijacking mobile phone accounts, identity thieves have found a new and easy way to make money. This new technique is a form of money laundering, because the thieves take over the mobile account so that they can order equipment like news phones to your account, then turn around and sell them. According to the […]

Intel CEO Acknowledges Uselessness of its Antivirus

June 28th, 2016

If at first you don’t succeed, try, try again, right? Sometimes, the answer is just no, as is the case with Intel remaining relevant in the personal computer security industry. As you may or may not remember back in the 1990’s, Intel had control of the almost completely useless antiviral, LanDesk Virus Protect. This antiviral […]

Healthcare Industry is the Ultimate Cyber Attack Target

June 24th, 2016

If you have been following this blog, you know that hospitals have become a major target of cybercriminals this year. But why? What is it about the healthcare industry that makes it so attractive to hackers? Vulnerability. Healthcare facilities need their equipment to be available, which makes them less secure. They were designed with patients […]

Cyber Ransom Liability Insurance

June 21st, 2016

As our blog’s history shows, the healthcare industry has become an increasingly popular ransomware target for cybercriminals. With this rise in attacks comes a new industry: Cyber Ransom Liability Insurance. Ransomware attacks began to rise earlier this year, so they are not covered under most standard insurance policies. When choosing a policy, it is important for […]

Invisible ATM Skimmers

June 16th, 2016

It was recently reported that credit card skimmers were being found at Walmart stores. Now we have video of skimmers that have been designed to fit invisibly inside an ATM card slot. Unlike old skimmers that were comparatively bulky, these new designs are incredibly thin and slide in over the magnetic strip reader. These new skimmers are impossible […]

HIPAA Misunderstandings in the Wake of Orlando Tragedy

June 16th, 2016

With the tragic events that unfolded in Orlando at the Pulse nightclub, a lot of questions about LGBT safety, gun control, and terrorism are being asked. And rightly so. Unfortunately, what has been lost in the tragedy is how HIPAA laws are used and how even those within the medical community often lack proper education […]

Hackers Find Scores of Pentagon Vulnerabilities

June 15th, 2016

Over 100 weaknesses have been found in the Pentagon’s networks and websites.  Fortunately, these hackers were paid to find them. 1400 hackers took part in Hack the Pentagon, a program created by the Department of Defense.  Their goal was to use whitehat hackers to probe for weaknesses with rewards of up to $15,000 for security […]

How the NSA Used MS Word Macros

June 13th, 2016

There have been new revelations about the US government’s spy program thanks to a series of Edward Snowden’s emails to the NSA’s SIGINT Oversight and Compliance Division released due to a Freedom of Information Act request. We’ve warned people time and again how macros embedded within Word documents are a prime attack vector of hackers, […]

Ransomware Getting More Expensive

June 9th, 2016

This year has seen a massive increase in Ransomware, and with that increase comes increasingly hefty ransoms. Savvy businesses worldwide have begun to stockpile Bitcoins, just to be on the safe side. One UK study, conducted by Citrix and Censuswide, which polled 250 IT managers, showed that a third of those companies have begun to […]

Russia Cracks Down on Hackers

June 6th, 2016

Law enforcement in Russia have carried out the largest ever arrest of hackers in the country after rounding up 50 people that were allegedly responsible for stealing more than $25 million from Russian financial institutions. Russia’s Interior Ministry and Federal Security Service (FSB) carried out raids across the country that seized computer equipment, financial documents, […]

It Wasn’t Dropbox’s Fault

June 6th, 2016

Unfortunately for Dropbox, last week several identity theft protection services including LifeLock wrongly reported that 73 million usernames and passwords had been stolen in a data breach on the cloud storage company. The problem is that Dropbox didn’t have a data breach, Tumblr did. The source of the mistake was the identity monitoring firm CSID. […]

Protect Yourself From Ransomware

June 3rd, 2016

Halfway through the fiscal year, the top 2016 hacker trend has become clear: ransomware. PhishMe, a threat management team, reports that ransomware attacks have increased 56% since 2015, and ransomware is attached to as much as 93% of all phishing emails. Why the trend? Ransomware is more efficient, easier to use and safer for the hacker. Moving Target The cybercriminals of […]

Shocking First Quarter Ransomware Stats

June 1st, 2016

Infoblox DNS Threat Index (a leading indicator of worldwide malicious Domain Name System threats) reported in Q1 2016 an increased threat of almost 10% over the previous quarter, resulting in an all-time high of 137. This is largely due to a 3500% increase in ransomware domains recorded in Q1 2016.  Cybercriminals and hackers use these domains to for nefarious activities […]

New Healthcare Breach Compromises Security of Nearly 100,000 Patients

June 1st, 2016

Florida-based business, Southeast Eye Institute, P.A. (d.b.a. Eye Associates of Pinellas) reported that as many as 87,314 individuals may have had  personal information stolen. This includes names, addresses, phone numbers, D.O.B., SSN, and insurance information.  Eye Associates of Pinellas was using medical software designed by, Bizmatics, a third-party provider.  Bizmatics notified Eye Associates on March 30, 2016, a  that […]

DHS Hacker Warning

May 31st, 2016

We already heard that machinery in US power plants were vulnerable to attacks from hackers and now the Department of Homeland Security has put out a warning saying just that. The department’s Computer Emergency Readiness Team (CERT) is concerned that the ESC 8832 data controller could be taken over by an attacker with the most basic […]

Raleigh Clinic to Pay $750,000 for HIPAA Violation

May 19th, 2016

Raleigh Orthopedic Clinic (ROC) of North Carolina is paying for its violation of the Health Insurance Portability and Accountability Act of 1996 Privacy Rule, for allegedly sharing private and protected patient information with a potential business partner. $750,000, to be exact. The Office of Civil Rights (a division of the U.S. Department of Health and Human […]

2016 Trend Shows Hackers Targeting Smaller Businesses

May 19th, 2016

The “Mega-hacks” of major health care industry players like Anthem, Inc and Premera Blue Cross, that were so popular in early 2016, seem to be giving way to attacks on smaller, more vulnerable businesses. A good example of this trend can be seen in the most recent industry breach of an 11-physician practice in Katy, […]

Top Cause of Healthcare Data Breaches

May 16th, 2016

Since 2010, the number of data breaches in the healthcare industry has been steadily on the rise. Consequently, a new study out by the Ponemon Institute has found that such breaches will end up costing the industry 6.2 billion dollars. The source of the breaches? Employees. According to the study, the thing that most organizations […]

Were You Infected by the American Dental Association?

April 28th, 2016

In an attempt to update dental procedure codes, the American Dental Association may have inadvertently infected thousands of dental offices across the United States with malware. As part of a mailer sent to ADA members, the thumb drives were intended to contain codes that offices use to keep track of procedures for billing and insurance […]