Cyber Security Threats
Stay informed about the ever-evolving landscape of cyber threats. Explore the latest developments in malware, ransomware, and zero-day vulnerabilities, and learn how to protect your digital assets from these risks.
Tax Season Sees IRS Tax Refund Spam Resurface
In the United States, tax season kicks off on January 1 and Americans must submit their annual tax returns before the April 15, deadline. As is usual at this time of year, new IRS tax … Read more
LastPass Phishing Vulnerability Discovered and Published
LastPass, the most popular password manager is susceptible to phishing attacks. A LastPass phishing vulnerability was recently uncovered, which could spell disaster for some LastPass users. Could your password manager be spoofed? One cybersecurity problem … Read more
New West Health Services Data Breach Affected 25,000 Patients
New West Health Services has begun informing 25,000 patients concerning the loss of a password-protected, unencrypted laptop containing wide-ranging Protected Health Information. Latest West Health Services Data Infringement Affects 25,000 Patients New West Health … Read more
New Lloyds Bank Phishing Scam Identified
A new Lloyds Bank phishing scam has been found by security researchers. The UK financial institution’s customers are being focused on just before Christmas with a highly realistic email, apparently shared from Lloyds Banking Group. … Read more
Telephone Phishing Swindle Affects 21K Blue Shield of California Customers
An infringement of PHI caused by a worker of a business partner who fell for a telephone phishing fraud has been informed by Blue Shield of California. Nearly 21,000 people have been influenced by the … Read more
Rise in Domain Spoofing Whaling Attacks
If you are employed in the accounting department of your company, you need to be more careful as hackers are specifically targeting account department executives. Whaling attacks are on the rise and hackers are using … Read more
Kaspersky Lab Uncovers Microsoft Silverlight Security Vulnerability
A Microsoft Silverlight security vulnerability is something of a rarity. The application framework may be similar to Adobe Flash, but it does not contain nearly as many security vulnerabilities. In fact, it is exceptionally rare … Read more
Microsoft Fixes Critical Windows Security Flaws
The first security update of the year for Microsoft may have only included 9 security bulletins, but six of them have been marked as critical. The critical Windows security flaws include 7 bugs that permit … Read more
Rovnix Malware Being Used to Attack Japanese Banks
Security researchers at IBM’s X-Force have identified a worrying new Rovnix malware strain that is being used in a spate of cyberattacks on Japanese banks. Rovnix malware is nothing new. It has been around for … Read more
Internet Explorer Security Risk Warning as Microsoft Pulls Plug on IE 8,9, 10
Microsoft has announced it will be pulling the plug on old versions of Internet Explorer and will be withdrawing software security support on IE 8, 9, and 10 from Tuesday January 12, 2016. An Internet … Read more
IU Health Arnett Security Infringement Affects 29K Patients
Arnett Hospital of Indiana University Health has notified 29,324 patients concerning the possible revelation of their Protected Health Information (PHI) following an unencrypted flash drive vanished from its emergency division. The flash drive was found … Read more
Hackable Bug Found In World’s Most Secure Smartphone
What is arguably the world’s most secure Smartphone may not be quite as secure as users have been led to believe. A hackable bug has been discovered that allows Silent Circle’s Blackphone 1 to be … Read more
TeslaCrypt Ransomware Attacks on the Rise
Gamers have been put on high alert following news that TeslaCrypt ransomware attacks are on the increase. The file-encrypting malware was first identified in March of this year, but this month the number of attempted … Read more
iOS Malware Boom Expected in 2016
The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from … Read more
Juniper Networks Backdoor: Further Information Emerges
Further information has emerged on the Juniper Networks backdoor discovered last week, which suggests the NSA had a hand in the installation of a backdoor in the company’s source code. Last week, a Juniper Networks … Read more
Apple Malware Infections Double in a Year
Hackers are concentrating on developing mobile malware that targets Android devices, but Apple malware infections are increasing. Furthermore, security researchers are predicting Apple malware infections will grow steadily over the course of the next 12 … Read more
3 PC Rise in Corporate Malware Attacks in 2015, Say Kaspersky
According to research conducted by Internet security firm Kaspersky Lab, corporate malware attacks have increased by 3% year-on-year. In 2015, 58% of companies had been attacked with malware on at least one occasion and the … Read more
Cryptowall Malware Just Got a Whole Lot More Dangerous
Cryptowall malware has been a major threat since it was first released on the unsuspecting world in September 2014. It did not take long for the malware to evolve, with a second version seen within … Read more
Insider Phishing Scams Targeting UK Tech Companies
Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent bank transfers. The … Read more
Google Account Phishing Email Prompts AG Warning
Massachusetts attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts to fool users into … Read more
New Facebook Video Phishing Scam Uncovered
It is almost every day that a Facebook video phishing scam is discovered, and yesterday was no exception. Scammers are increasingly looking to take advantage of Facebook’s drive to compete with YouTube as the go … Read more
Intuit Security Warning Scam: Quicksbooks Users Targeted
Users of the Intuit Quickbooks accounting software package are being targeted by scammers. Emails have been sent to users of the software warning them that they need to update their web browsers for ‘the best … Read more
Bitcoin Black Friday: Bargain Hunters Beware!
The biggest online shopping day of the year may be Cyber Monday, but for the Bitcoin community it is Bitcoin Black Friday. Bitcoin has grown in popularity with the online community as a secure alternative … Read more
Phishing Warning Issued as IRS e-Services Scam Discovered
The discovery of a new IRS e-Services scam has prompted the Internal Revenue Service to kick off its Security Awareness Tax Tips with a phishing warning. New IRS e-Services Scam Reported IRS tax scams are … Read more
Customers Advised to Watch for Electric Ireland Phishing Scam
Phishing emails, which seem to be genuine have been recently targeting Electric Ireland customers. They give a genuine reason for clicking on the link included in the email and have been well written. The link … Read more
New Critical Android Vulnerability Discovered
A new critical Android vulnerability has been discovered that could potentially allow Android Smartphones to be hijacked by hackers without any user interaction required. The vulnerability affects Chrome JavaScript v8 – and not just older … Read more
Ransomware Protection: SMBs Must Get Prepared
SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB, ransomware protection is essential. … Read more
Email Scam Uncovered Involving DRIDEX Malware
A new DRIDEX email scam campaign has been identified that has resulted in an angry response from Swedish furniture retailer Ikea. The hackers to blame for the malware have targeted Ikea customers by sending fake … Read more
Credit Card Numbers Captured in iTunes Email Scam
A recent report published by Malwarebytes has revealed that a new email scam campaign has been identified which tries to con users to trick users into sharing the credit card numbers that they use for iTunes. … Read more
A Honeypot for Malware Can be of Great Benefit to Your Organization
Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware regardless, so why not … Read more
Car Theft Leads to Revelation of PHI of 2900 People
Insurance Data Services (IDS), a Wyoming-based medicinal invoicing firm, has begun to send break notice letters to patients of Claystone Clinical Associates, one of its HIPAA-covered customers, to notify them of the possible revelation of … Read more
Porn Malvertising Targets Top Porn Site Visitors
Porn websites are often considered to be rife with malware, although the major websites spend big to keep their sites malware free. That said, a recent porn malvertising campaign hit one of the largest adult … Read more
Cisco Router Malware Discovered
According to reports from FireEye, IT security professionals do not only need to be concerned about malware attacks on computers, servers, and Android devices: Cisco router malware has now been discovered. Cisco router malware discovered … Read more
Lessons Learned from the Ashley Madison Data Breach
Did you think the Ashley Madison data breach was mildly humorous? Did you think that it serves the people right for cheating on their husband, wife or life partner? If you did, you certainly didn’t … Read more
The Ever Changing Role of a Systems Administrator
The role of a systems administrator is certainly challenging, mainly because it is constantly changing. This is the way it always has been since the role of a systems administrator was first defined. Now if … Read more
Urology Associates Notifies 6500-Record Documents Break
Offsite storing of paper medical files might be convenient if facility room is restricted; but as Kailspell-based healthcare supplier, Urology Associates lately found the decision to store files offsite might prove to be costly. The … Read more
SMBs Can Minimize Cybersecurity Risk with Good Risk Management Strategies
All companies must make efforts to minimize cybersecurity risk, but for small to medium sized businesses it is critical. The very survival of the business may well depend on it. Small to medium-sized businesses must … Read more
Healthcare Software Security Evaluated by Veracode
The cloud presents healthcare suppliers the chance to simplify the provision and administration of medical facilities. However, healthcare suppliers trying to use the ability of the cloud might possibly be putting Protected Health Information (PHI) … Read more
Adobe Flash Exploit Delivering Cryptowall Ransomware
Last week, a zero-day vulnerability in Adobe Flash Player was patched. Users of the multimedia player can now run the software safely, without facing a risk of having their devices compromised by a new Adobe … Read more
Crown Point Medical Tests Uncovers HIPAA Breach
A former company belonging to Crown Point Medical Tests has breached the Health Insurance Portability and Accountability Act (HIPAA) when it did not securely throw away files having the Protected Health Information (PHI) of more … Read more
Best Firewall Security Zone Segmentation Setup
Regardless of the size of your company, or what type of TCP/IP setup you have, a hardware firewall is essential. It is one of the most fundamental network security elements. It provides basic protection and … Read more
Is It a Good BYOD Strategy to Not Allow Personal Devices to Connect to the Network?
The Internet of Things of IoT offers a lot of potential, but unfortunately these Internet-connected devices also introduce a considerable amount of risk. The term Internet of Things covers any device that connects to the … Read more
Bank Phishing Scams Claim Many Victims
The financial sector is reeling from one of the most sophisticated cyberattacks ever seen. The APT-style Carbanak malware attack differs from other APT attacks, as the attackers are not after data. They want cold hard … Read more
Symantec Study Confirms Data Breaks Rose 23% in 2014
It’s April, which indicates the announcement of the Symantec Yearly Internet Security Statement. Every year the security software business issues a report collected from the files that it accumulated throughout the course of the previous … Read more
You Need to Learn How to Think Like a Hacker to Secure Your Network
If you watch Scorpion on CBS, you will be familiar with Walter. Walter knowns how to think like a hacker. He is one. In fact, Walter was an malicious as a child. He hacked the … Read more
Beebone Botnet Shut Down by Europol
The infamous and particularly dangerous Beebone botnet has finally been taken out of action following a joint initiative between Europol and the FBI. The Beebone botnet was believed to be controlling well over 100,000 computers … Read more
Anthem Data Break Projected to Cost Over $100 Million
A HIPAA break carries a massive fiscal fine and one the level of which lately impacted Anthem Inc., is thought to cause costs of several tens of millions of dollars. Anthem has an insurance plan … Read more
Holiday Season Sees Employees Ignore Basic Web Security Practices
Holiday shopping season is almost upon us. Not only does Thanksgiving weekend signal the start of the Christmas shopping rush, the two busiest online shopping days of the year fall either side of Thanksgiving weekend … Read more
Data Secrecy Break to Cost Tenet Healthcare up to $32.5 Million
Tenet Healthcare is among the top suppliers of healthcare in the United States of America with the Texas-based business managing healthcare facilities throughout the country. For the previous 17 years, the business has been involved … Read more
Aventura Hospice Suffers Third HIPAA Violation Revealing 82,601 Files
Aventura Hospital and Medical Center has found that the HIPAA infringements it suffered throughout the past 2 years were merely the tip of the iceberg. It has now declared a 3rd security break which has … Read more