Cyber Security Threats

Stay informed about the ever-evolving landscape of cyber threats. Explore the latest developments in malware, ransomware, and zero-day vulnerabilities, and learn how to protect your digital assets from these risks.

Medical Equipment Cybersecurity: Tomographic Scanner Hacked via Hospital Wi-Fi

In recent months, concern has been growing over the lack of medical equipment cybersecurity protections in place at hospitals and medical centers. Healthcare providers are being targeted by cybercriminals for the confidential data they store … Read more

Customers Blamed for Virgin Media Spoofed Emails

Virgin Media clients have been complaining about a rise the in the number of spam emails since September 2015, with many targeted by spoofed emails. However, a statement recently issued by Virgin Media claims that … Read more

911 Dispatcher Sacked for Secrecy Breach

The illegal sharing of secret health info on Facebook has led to a 911 dispatcher losing her job, however that might not be the conclusion of it. The patient whose secrecy was breached thinks the loss … Read more

What is the Motivation Behind Cyberattacks? Study Offers New Insights

Many security professionals would like to know what is the motivation behind cyberattacks? How much do hackers earn? What actually motivates hackers to attack a particular organization? How long do hackers try before giving up … Read more

Hawai‘i Medical Facility Association Privacy Infringement Affects 10,800

Autonomous Blue Cross Blue Shield license holder Hawai‘i Medical Service Association (HMSA) has begun sending infringement announcement letters to 10,800 members warning them to a privacy infringement that led to one member’s medical disorder being … Read more

Employee Security Training Can Greatly Improve Security Posture

Employee security training is an essential part of an organization’s defense against cyberattacks, yet many CISOs and CSOs are not conducting regular training. In fact, according to a survey conducted last year on behalf of … Read more

Community Mercy Health Partners Informs Patients of November Data Infringement

During late November, a member of the public found many documents at a recycling center which seemed to have come from hospitals administrated by Community Mercy Health Partners. The documents included complete info concerning patients … Read more

Cost of Bot Fraud to Rise to 7 Billion in 2016

The cost of bot fraud in 2016 is likely to rise to a staggering $7.2 billion, according to a new report by the Association of National Advertisers (ANA). 2015 Bot Baseline study places the cost … Read more

Six Lost Hard Drives Informed by Centene: 950,000 Members Affected

Centene Corporation, Wisconsin-based health insurer, has declared the loss of 6 unencrypted computer hard drives having the safeguarded health information of roughly 950,000 of its members. The hard drives were being utilized for a job … Read more

Data Privacy Concerns in Britain Highlighted by New Study

A new study has revealed that British consumers are becoming increasingly worried about how companies are using the data they provide online. Data privacy concerns in Britain are now at a level where more people … Read more

Hidden Scripts on Servers Redirecting Users to Malicious Websites

Anti-virus software company Symantec has uncovered a new global web server infection. Hidden scripts on servers are redirecting website visitors to potentially malicious websites. So far over 3,500 hidden scripts on servers have been identified, … Read more

Greater Email Security Required in Healthcare Industry Following Phishing Report

In the United States, healthcare sector phishing attacks have been to blame for exposing the protected health records of well over 90 million Americans over the course of the past year. That’s in excess of … Read more

Tax Season Sees IRS Tax Refund Spam Resurface

In the United States, tax season kicks off on January 1 and Americans must submit their annual tax returns before the April 15, deadline. As is usual at this time of year, new IRS tax … Read more

LastPass Phishing Vulnerability Discovered and Published

LastPass, the most popular password manager is susceptible to phishing attacks. A LastPass phishing vulnerability was recently uncovered, which could spell disaster for some LastPass users. Could your password manager be spoofed? One cybersecurity problem … Read more

New West Health Services Data Breach Affected 25,000 Patients

New West Health Services has begun informing 25,000 patients concerning the loss of a password-protected, unencrypted laptop containing wide-ranging Protected Health Information. Latest West Health Services Data Infringement Affects 25,000 Patients   New West Health … Read more

New Lloyds Bank Phishing Scam Identified

A new Lloyds Bank phishing scam has been found by security researchers. The UK financial institution’s customers are being focused on just before Christmas with a highly realistic email, apparently shared from Lloyds Banking Group. … Read more

Telephone Phishing Swindle Affects 21K Blue Shield of California Customers

An infringement of PHI caused by a worker of a business partner who fell for a telephone phishing fraud has been informed by Blue Shield of California. Nearly 21,000 people have been influenced by the … Read more

Rise in Domain Spoofing Whaling Attacks

If you are employed in the accounting department of your company, you need to be more careful as hackers are specifically targeting account department executives. Whaling attacks are on the rise and hackers are using … Read more

Kaspersky Lab Uncovers Microsoft Silverlight Security Vulnerability

A Microsoft Silverlight security vulnerability is something of a rarity. The application framework may be similar to Adobe Flash, but it does not contain nearly as many security vulnerabilities. In fact, it is exceptionally rare … Read more

Microsoft Fixes Critical Windows Security Flaws

The first security update of the year for Microsoft may have only included 9 security bulletins, but six of them have been marked as critical. The critical Windows security flaws include 7 bugs that permit … Read more

Rovnix Malware Being Used to Attack Japanese Banks

Security researchers at IBM’s X-Force have identified a worrying new Rovnix malware strain that is being used in a spate of cyberattacks on Japanese banks. Rovnix malware is nothing new. It has been around for … Read more

Internet Explorer Security Risk Warning as Microsoft Pulls Plug on IE 8,9, 10

Microsoft has announced it will be pulling the plug on old versions of Internet Explorer and will be withdrawing software security support on IE 8, 9, and 10 from Tuesday January 12, 2016. An Internet … Read more

IU Health Arnett Security Infringement Affects 29K Patients

Arnett Hospital of Indiana University Health has notified 29,324 patients concerning the possible revelation of their Protected Health Information (PHI) following an unencrypted flash drive vanished from its emergency division. The flash drive was found … Read more

Hackable Bug Found In World’s Most Secure Smartphone

What is arguably the world’s most secure Smartphone may not be quite as secure as users have been led to believe. A hackable bug has been discovered that allows Silent Circle’s Blackphone 1 to be … Read more

TeslaCrypt Ransomware Attacks on the Rise

Gamers have been put on high alert following news that TeslaCrypt ransomware attacks are on the increase. The file-encrypting malware was first identified in March of this year, but this month the number of attempted … Read more

iOS Malware Boom Expected in 2016

The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from … Read more

Juniper Networks Backdoor: Further Information Emerges

Further information has emerged on the Juniper Networks backdoor discovered last week, which suggests the NSA had a hand in the installation of a backdoor in the company’s source code. Last week, a Juniper Networks … Read more

Apple Malware Infections Double in a Year

Hackers are concentrating on developing mobile malware that targets Android devices, but Apple malware infections are increasing. Furthermore, security researchers are predicting Apple malware infections will grow steadily over the course of the next 12 … Read more

3 PC Rise in Corporate Malware Attacks in 2015, Say Kaspersky

According to research conducted by Internet security firm Kaspersky Lab, corporate malware attacks have increased by 3% year-on-year. In 2015, 58% of companies had been attacked with malware on at least one occasion and the … Read more

Cryptowall Malware Just Got a Whole Lot More Dangerous

Cryptowall malware has been a major threat since it was first released on the unsuspecting world in September 2014. It did not take long for the malware to evolve, with a second version seen within … Read more

Insider Phishing Scams Targeting UK Tech Companies

Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent bank transfers. The … Read more

Google Account Phishing Email Prompts AG Warning

Massachusetts attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts to fool users into … Read more

New Facebook Video Phishing Scam Uncovered

It is almost every day that a Facebook video phishing scam is discovered, and yesterday was no exception. Scammers are increasingly looking to take advantage of Facebook’s drive to compete with YouTube as the go … Read more

Intuit Security Warning Scam: Quicksbooks Users Targeted

Users of the Intuit Quickbooks accounting software package are being targeted by scammers. Emails have been sent to users of the software warning them that they need to update their web browsers for ‘the best … Read more

Bitcoin Black Friday: Bargain Hunters Beware!

The biggest online shopping day of the year may be Cyber Monday, but for the Bitcoin community it is Bitcoin Black Friday. Bitcoin has grown in popularity with the online community as a secure alternative … Read more

Phishing Warning Issued as IRS e-Services Scam Discovered

The discovery of a new IRS e-Services scam has prompted the Internal Revenue Service to kick off its Security Awareness Tax Tips with a phishing warning. New IRS e-Services Scam Reported IRS tax scams are … Read more

Customers Advised to Watch for Electric Ireland Phishing Scam

Phishing emails, which seem to be genuine have been recently targeting Electric Ireland customers. They give a genuine reason for clicking on the link included in the email and have been well written. The link … Read more

New Critical Android Vulnerability Discovered

A new critical Android vulnerability has been discovered that could potentially allow Android Smartphones to be hijacked by hackers without any user interaction required. The vulnerability affects Chrome JavaScript v8 – and not just older … Read more

Ransomware Protection: SMBs Must Get Prepared

SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB, ransomware protection is essential. … Read more

Email Scam Uncovered Involving DRIDEX Malware

A new DRIDEX email scam campaign has been identified that has resulted in an angry response from Swedish furniture retailer Ikea. The hackers to blame for the malware have targeted Ikea customers by sending fake … Read more

Credit Card Numbers Captured in iTunes Email Scam

A recent report published by Malwarebytes has revealed that a new email scam campaign has been identified which tries to con users to trick users into sharing the credit card numbers that they use for iTunes. … Read more

A Honeypot for Malware Can be of Great Benefit to Your Organization

Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware regardless, so why not … Read more

Car Theft Leads to Revelation of PHI of 2900 People

Insurance Data Services (IDS), a Wyoming-based medicinal invoicing firm, has begun to send break notice letters to patients of Claystone Clinical Associates, one of its HIPAA-covered customers, to notify them of the possible revelation of … Read more

Porn Malvertising Targets Top Porn Site Visitors

Porn websites are often considered to be rife with malware, although the major websites spend big to keep their sites malware free. That said, a recent porn malvertising campaign hit one of the largest adult … Read more

Cisco Router Malware Discovered

According to reports from FireEye, IT security professionals do not only need to be concerned about malware attacks on computers, servers, and Android devices: Cisco router malware has now been discovered. Cisco router malware discovered … Read more

Lessons Learned from the Ashley Madison Data Breach

Did you think the Ashley Madison data breach was mildly humorous? Did you think that it serves the people right for cheating on their husband, wife or life partner? If you did, you certainly didn’t … Read more

The Ever Changing Role of a Systems Administrator

The role of a systems administrator is certainly challenging, mainly because it is constantly changing. This is the way it always has been since the role of a systems administrator was first defined. Now if … Read more

Urology Associates Notifies 6500-Record Documents Break

Offsite storing of paper medical files might be convenient if facility room is restricted; but as Kailspell-based healthcare supplier, Urology Associates lately found the decision to store files offsite might prove to be costly. The … Read more

SMBs Can Minimize Cybersecurity Risk with Good Risk Management Strategies

All companies must make efforts to minimize cybersecurity risk, but for small to medium sized businesses it is critical. The very survival of the business may well depend on it. Small to medium-sized businesses must … Read more

Healthcare Software Security Evaluated by Veracode

The cloud presents healthcare suppliers the chance to simplify the provision and administration of medical facilities. However, healthcare suppliers trying to use the ability of the cloud might possibly be putting Protected Health Information (PHI) … Read more