April 26th, 2016
It appears there’s a new form of ransomware that was clearly created by hackers who are fans of the movie “Saw”. Going by the name Jigsaw, not only does it encrypt files and ask for money to unlock them, it also begins to delete your files while raising the ransom demand. Taking its name from the […]
Posted in Blog, Cyber Security | Comments Off on Jigsaw Ransomware
April 26th, 2016
Hackers were able to get into the systems of the Bangladesh central bank and steal $81 million dollars thanks to one of the most ridiculous security lapses ever seen: cheap routers. After being alerted to a data breach in February, law enforcement realized that not only were the bank’s computers connected to the SWIFT global […]
Posted in Blog, Cyber Security | Comments Off on Hackers Steal $81 Million from One Bank
April 22nd, 2016
In the past year ransomware attacks, malware that encrypts files then demands payment in Bitcoins to get a key to unlock them, have not only increased in number of attacks, but also the types of organizations hit. Medical facilities have been a big target. Hollywood Presbyterian Hospital in Los Angeles paid about $17,000 to hackers […]
Posted in Blog, Cyber Security | Comments Off on The Staggering Numbers Behind Ransomware
April 20th, 2016
There’s been a recent rash malware that utilizes JavaScript-based downloaders to install ransomware on victims’ computers. Like most ransomware, it then encrypts their files and demands payment in Bitcoins to get a key to unlock them. It’s pretty unusual for anyone to send a Javascript attachment, so users should be on the lookout for any […]
Posted in Blog, Cyber Security | Comments Off on Ransomware in JavaScript
April 15th, 2016
With technology advancing so rapidly there’s sure to be an impact on medicine. Already we are seeing advancements in how people collect health data; how to prevent, detect, and treat illness; and there are fundamental changes in how and where treatment is given. Here are eight technologies to watch in order to see how they […]
Posted in Blog, Technology | Comments Off on Eight Medical Technologies to Watch
April 8th, 2016
According to the FBI, instance of CEO fraud are dramatically on the rise. Costing businesses an estimated $2.3 billion over the past three years, victims are usually duped by scammers who impersonate a company’s CEO via email then have money wired to the criminals’ account. Typically this type of attack starts with either sending a […]
Posted in Blog, Cyber Security | Comments Off on Rise in CEO Fraud
April 6th, 2016
Now that smart phones have become ubiquitous to our daily lives, making everything from banking to turning on the lights more convenient, it’s not surprising that the healthcare industry is trying to utilize this technology to provide better patient care by giving doctors information in real time. Unfortunately that convenience may come at the price […]
Posted in Blog | Comments Off on Duke Among the First to Implement Apple Healthkit
March 22nd, 2016
A new version of ransomware called Locky infected Methodist Hospital in Henderson, Kentucky. The hospital put itself on an internal state of emergency after the malware took over their system. Locky isn’t very different from other ransomware, but it’s used by criminal network Dridex, which is causing it to spread very quickly. The Locky ransomware infects a single computer spreads to connected […]
Posted in Blog, Cyber Security | Comments Off on Ransomware Attack on Methodist Hospital
March 3rd, 2016
A new method of identity theft spoofs a CEO’s email address to trick an employee into sending W-2 information to hackers. One recent victim of this fraud was Pennsylvania Main Line Health. 11,000 employees of the hospital and health center network had sensitive information stolen by hackers. The company was unaware of the hack until the FBI […]
Posted in Blog, Cyber Security | Comments Off on 11,000 Main Line Health Employees Information Stolen
February 19th, 2016
Your medical or healthcare practice is in grave danger, and you probably don’t even know it. Any random thief can spend less than $100 and get the keys to your network. The breach could cost you millions and make your patients run for the hills. The same kind of attack cost Target $162 million. Home […]
Posted in Blog, Cyber Security | Comments Off on #1 Disease Infecting Most Medical Practices
February 19th, 2016
The Hollywood Presbyterian Medical Center in Los Angeles, California was recent hit with ransomware and paid 40 bitcoins, the equivalent of $16,664, to get their network back. When the attack occurred on February 5, the hospital immediately informed IT security and law enforcement agencies. While the computer network was locked down, however, the hospital had to […]
Posted in Blog, Cyber Security | Comments Off on Hospital Pays Hackers $16.7K
November 23rd, 2015
As Apple developed HealthKit, the Federal Trade Commission raised concerns about what would happen to users’ data. Commissioners became satisfied that Apple’s privacy policy would prevent app developers from sharing info with third parties. Craig Petronella, who heads up Petronella Technology Group, Inc., in Wake County, says there are still steps that should be taken […]
Posted in Press | Comments Off on Duke program allows patients track, share health data from phones
October 28th, 2015
The North Carolina Department of Information Technology which oversees the state’s cybersecurity insisted in a statement that their sites are not vulnerable. They also said when they became aware of the issue, they developed a plan to address the concerns. They are not aware of any information being compromised, according to the state and that […]
Posted in Press | Comments Off on State Websites Could be Vulnerable to Hackers
October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Need info about your business competitors? Revenge on a cheating ex? Everyone from jilted lovers to law firms has hired freelance hackers. The […]
Posted in Blog, Cyber Security | Comments Off on Hackers for Hire
October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text] As much as we hear about the major cyberattacks against large corporations and even governments, the majority of cyberattacks are carried out […]
Posted in Blog, Cyber Security | Comments Off on Five Tips for Keep Hackers Out of Your Home
October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Hilton appears to be the most recent victim of POS malware responsible for stealing the credit card of information of customers. In this […]
Posted in Blog, Cyber Security | Comments Off on Hilton Hacked
October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Adobe released an update yesterday to patch over 20 security vulnerabilities. And Shockwave still isn’t up to snuff. The nearly two dozen patches […]
Posted in Blog, Cyber Security | Comments Off on Adobe Updates and the Case Again Shockwave
October 1st, 2015
[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”0″ padding_right=”0″ hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Verizon customers are experiencing a service outage in the Raleigh-Durham area late Monday afternoon, with the outage starting around 2:45 PM. Verizon confirmed […]
Posted in Blog | Comments Off on Verizon Out in RDU
August 14th, 2015
Two-time IT author and professional in the field of cyber security, Craig Petronella, has announced methods that he feels can be used to take action against cyber thieves. Craig Petronella has 23 years of experience in this field and computer security. Some of his tips for consumers include advising against credit card use over the […]
Posted in Blog, Press | Comments Off on Lenovo cuts include 230 people in Triangle
July 27th, 2015
“That is how I found out the bots were constantly trying to sign in,” he said. “I get four notifications a day saying somebody tried to sign in to your website.” That situation is actually quite common, said Craig Petronella, president of Petronella Technology Group in Raleigh. There are black market programs that search for […]
Posted in Cyber Security, Press | Comments Off on Cybersecurity proves to be a necessity for owner of Durham’s Cocoa Cinnamon
Page 38 of 39« First«...3536373839»