Elizabeth Hernandez

Photo of author
Elizabeth Hernandez is a news writer on Defensorum. Elizabeth is an experienced journalist who has worked on many publications for several years. Elizabeth writers about compliance and the related areas of IT security breaches. Elizabeth's has focus on data privacy and secure handling of personal information. Elizabeth has a postgraduate degree in journalism. Elizabeth Hernandez is the editor of HIPAAZone. https://twitter.com/ElizabethHzone

Rise in Domain Spoofing Whaling Attacks

If you are employed in the accounting department of your company, you need to be more careful as hackers are specifically targeting account department executives. Whaling attacks are on the rise and hackers are using domain spoofing techniques to trick … Read more

Kaspersky Lab Uncovers Microsoft Silverlight Security Vulnerability

A Microsoft Silverlight security vulnerability is something of a rarity. The application framework may be similar to Adobe Flash, but it does not contain nearly as many security vulnerabilities. In fact, it is exceptionally rare for a bug to be … Read more

Microsoft Fixes Critical Windows Security Flaws

The first security update of the year for Microsoft may have only included 9 security bulletins, but six of them have been marked as critical. The critical Windows security flaws include 7 bugs that permit the remote execution of code, … Read more

Rovnix Malware Being Used to Attack Japanese Banks

Security researchers at IBM’s X-Force have identified a worrying new Rovnix malware strain that is being used in a spate of cyberattacks on Japanese banks. Rovnix malware is nothing new. It has been around for a couple of years but … Read more

Internet Explorer Security Risk Warning as Microsoft Pulls Plug on IE 8,9, 10

Microsoft has announced it will be pulling the plug on old versions of Internet Explorer and will be withdrawing software security support on IE 8, 9, and 10 from Tuesday January 12, 2016. An Internet Explorer security risk warning has … Read more

Hackable Bug Found In World’s Most Secure Smartphone

What is arguably the world’s most secure Smartphone may not be quite as secure as users have been led to believe. A hackable bug has been discovered that allows Silent Circle’s Blackphone 1 to be hijacked. On its release, Silent … Read more

TeslaCrypt Ransomware Attacks on the Rise

Gamers have been put on high alert following news that TeslaCrypt ransomware attacks are on the increase. The file-encrypting malware was first identified in March of this year, but this month the number of attempted attacks has skyrocketed. TeslaCrypt ransomware … Read more

iOS Malware Boom Expected in 2016

The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from malware. While previously thought of … Read more

Juniper Networks Backdoor: Further Information Emerges

Further information has emerged on the Juniper Networks backdoor discovered last week, which suggests the NSA had a hand in the installation of a backdoor in the company’s source code. Last week, a Juniper Networks backdoor was discovered after the … Read more

Apple Malware Infections Double in a Year

Hackers are concentrating on developing mobile malware that targets Android devices, but Apple malware infections are increasing. Furthermore, security researchers are predicting Apple malware infections will grow steadily over the course of the next 12 months. Apple malware infections are … Read more

3 PC Rise in Corporate Malware Attacks in 2015, Say Kaspersky

According to research conducted by Internet security firm Kaspersky Lab, corporate malware attacks have increased by 3% year-on-year. In 2015, 58% of companies had been attacked with malware on at least one occasion and the motivation for conducting corporate malware … Read more

Cryptowall Malware Just Got a Whole Lot More Dangerous

Cryptowall malware has been a major threat since it was first released on the unsuspecting world in September 2014. It did not take long for the malware to evolve, with a second version seen within a matter of weeks. A … Read more

Insider Phishing Scams Targeting UK Tech Companies

Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent bank transfers. The insider phishing scams are highly … Read more

Google Account Phishing Email Prompts AG Warning

Massachusetts attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts to fool users into revealing their passwords by warning … Read more

New Facebook Video Phishing Scam Uncovered

It is almost every day that a Facebook video phishing scam is discovered, and yesterday was no exception. Scammers are increasingly looking to take advantage of Facebook’s drive to compete with YouTube as the go to place for watching video … Read more

Intuit Security Warning Scam: Quicksbooks Users Targeted

Users of the Intuit Quickbooks accounting software package are being targeted by scammers. Emails have been sent to users of the software warning them that they need to update their web browsers for ‘the best online experience’. They are issued … Read more

Bitcoin Black Friday: Bargain Hunters Beware!

The biggest online shopping day of the year may be Cyber Monday, but for the Bitcoin community it is Bitcoin Black Friday. Bitcoin has grown in popularity with the online community as a secure alternative method of paying for goods … Read more

Phishing Warning Issued as IRS e-Services Scam Discovered

The discovery of a new IRS e-Services scam has prompted the Internal Revenue Service to kick off its Security Awareness Tax Tips with a phishing warning. New IRS e-Services Scam Reported IRS tax scams are nothing new. In fact the … Read more

Customers Advised to Watch for Electric Ireland Phishing Scam

Phishing emails, which seem to be genuine have been recently targeting Electric Ireland customers. They give a genuine reason for clicking on the link included in the email and have been well written. The link brings the recipient to a … Read more

New Critical Android Vulnerability Discovered

A new critical Android vulnerability has been discovered that could potentially allow Android Smartphones to be hijacked by hackers without any user interaction required. The vulnerability affects Chrome JavaScript v8 – and not just older devices but the latest models … Read more

Ransomware Protection: SMBs Must Get Prepared

SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB, ransomware protection is essential. Ransomware protection is no longer … Read more

Bermuda Electricity Company Customers Targeted with Ransomware

Citizen of Bermuda and holiday home owners have been warned to be diligent following the identification of a new BELCO email scam. Guidance has now been issued by the company after some customers were targeted by scammers and were issues … Read more

Email Scam Uncovered Involving DRIDEX Malware

A new DRIDEX email scam campaign has been identified that has resulted in an angry response from Swedish furniture retailer Ikea. The hackers to blame for the malware have targeted Ikea customers by sending fake emails asking them to open … Read more

Credit Card Numbers Captured in iTunes Email Scam

A recent report published by Malwarebytes has revealed that a new email scam campaign has been identified which tries to con users to trick users into sharing the credit card numbers that they use for iTunes. This email scam involves contacting … Read more

A Honeypot for Malware Can be of Great Benefit to Your Organization

Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware regardless, so why not make sure it gets installed … Read more

Porn Malvertising Targets Top Porn Site Visitors

Porn websites are often considered to be rife with malware, although the major websites spend big to keep their sites malware free. That said, a recent porn malvertising campaign hit one of the largest adult websites placing millions of site … Read more

Apple Malware Attack Affects 225,000 Device Owners

Apple device security is particularly robust, yet the company’s operating systems are far from impregnable as a recent Apple malware attack has shown. Apple device users have recently been targeted by hackers believed to be operating out of China. The … Read more

Cisco Router Malware Discovered

According to reports from FireEye, IT security professionals do not only need to be concerned about malware attacks on computers, servers, and Android devices: Cisco router malware has now been discovered. Cisco router malware discovered on 79 devices to date … Read more

Lessons Learned from the Ashley Madison Data Breach

Did you think the Ashley Madison data breach was mildly humorous? Did you think that it serves the people right for cheating on their husband, wife or life partner? If you did, you certainly didn’t have an account with the … Read more

The Ever Changing Role of a Systems Administrator

The role of a systems administrator is certainly challenging, mainly because it is constantly changing. This is the way it always has been since the role of a systems administrator was first defined. Now if you were to write down … Read more

Benefits of Teaching Hacking Techniques

This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it is, but teaching hacking techniques … Read more

SMBs Can Minimize Cybersecurity Risk with Good Risk Management Strategies

All companies must make efforts to minimize cybersecurity risk, but for small to medium sized businesses it is critical. The very survival of the business may well depend on it. Small to medium-sized businesses must minimize cybersecurity risk The same … Read more

Adobe Flash Exploit Delivering Cryptowall Ransomware

Last week, a zero-day vulnerability in Adobe Flash Player was patched. Users of the multimedia player can now run the software safely, without facing a risk of having their devices compromised by a new Adobe Flash exploit. Provided the patch … Read more

Best Firewall Security Zone Segmentation Setup

Regardless of the size of your company, or what type of TCP/IP setup you have, a hardware firewall is essential. It is one of the most fundamental network security elements. It provides basic protection and is capable of preventing many … Read more

Five Common Business Network Security Myths

Unfortunately, common business network security myths have led many small to medium sized business owners to believe they are well protected against hackers, malicious insiders, and online criminals. They perceive their network to be secure, but that confidence may be … Read more

Is It a Good BYOD Strategy to Not Allow Personal Devices to Connect to the Network?

The Internet of Things of IoT offers a lot of potential, but unfortunately these Internet-connected devices also introduce a considerable amount of risk. The term Internet of Things covers any device that connects to the internet, which includes a wide … Read more

Bank Phishing Scams Claim Many Victims

The financial sector is reeling from one of the most sophisticated cyberattacks ever seen. The APT-style Carbanak malware attack differs from other APT attacks, as the attackers are not after data. They want cold hard cash and they are getting … Read more

You Need to Learn How to Think Like a Hacker to Secure Your Network

If you watch Scorpion on CBS, you will be familiar with Walter. Walter knowns how to think like a hacker. He is one. In fact, Walter was an malicious as a child. He hacked the government and got up to … Read more

Beebone Botnet Shut Down by Europol

The infamous and particularly dangerous Beebone botnet has finally been taken out of action following a joint initiative between Europol and the FBI. The Beebone botnet was believed to be controlling well over 100,000 computers late last year, and while … Read more

Best Patch Management Practices

All operating systems have security issues Best patch management practices enable you keep on top of the security issues that are constantly being discovered. It seems as soon as one patch is released to deal with xyz security issue, another … Read more

Holiday Season Sees Employees Ignore Basic Web Security Practices

Holiday shopping season is almost upon us. Not only does Thanksgiving weekend signal the start of the Christmas shopping rush, the two busiest online shopping days of the year fall either side of Thanksgiving weekend – Black Friday and Cyber … Read more

Cyberattacks on Universities Grow: Time to Boost Defenses

All computer users are at risk of downloading malware or computer viruses. The malicious software is sent out in bulk mail, and everyone will receive an infected email attachment or a link to a malicious website at some point. Often … Read more

Tighten Password Security or You Will Be Hacked!

According to recent research, the number of stolen password and username combos for sale on the Internet is around 360 million. That number is likely to grow substantially, as hackers are targeting companies and are stealing login credentials. If you … Read more

Contractor Security Risk Management Advice

If you want to keep your network as secure as possible, don’t let anyone connect to it. That is not particularly practical advice of course. Employees must be allowed access, and when devices are allowed to connect to a network, … Read more

How the Target Hack Would have been Worthless with Encrypted Credit Cards

Encrypted credit cards? Don´t they already exist? Encrypted credit cards have been around for a long time now – or, at least, credit cards with a limited amount of encryption. The magnetic strip on the back of each credit card … Read more

Employee Libel on Social Media: Employers May Be Found Liable

Sexual harassment in the workplace and unfair dismissal were two of the main reasons for legal action being taken against employers; however, now employee libel on social media websites can be added to that list. It is now far easier … Read more

Dorkbot Malware Spotted on Facebook Chat

Facebook invests heavily in security protections for its users and advertisers; however hackers have been using a new variant of Dorkbot malware and have been using Facebook chat to infect users’ devices. Dorkbot malware is a W32 worm that spies … Read more

Skype Account Vulnerabilities Reported

Skype offers businesses a way to cut telecommunication costs, while simultaneously improving communication between employees and making it easier for customers to get in touch. However, many companies have failed to deal with Skype account vulnerabilities and are leaving their … Read more

What is the Risk of Digital Life Hacking? Are You in Danger?

Many people are concerned about identity theft and believe that the risk of digital life hacking is considerable. Others think that having their digital life hacked, stolen, and taken over by someone else is something that only happens in the … Read more

Facebook Graph Search Privacy Issues Cause Concern

Facebook Graph Search privacy issues have been caused concern, especially for business owners. They are worried that their confidential information will be used by the social network and shown in the search results. As a result, many companies and individuals … Read more