Financial Organizations Beware Of Documents Asking To Enable Content
If you work in the financial sector, be advised that there’s a large scale botnet-driven malware campaign underway. It has been targeting firms in both the US and the UK. The malware at the heart of the campaign is Emotet, which began life as a banking trojan, but it has morphed into something quite different […]
New Malware Uses This Year’s Top Movies To Get Clicks
It’s easy to get caught up in the hype of popular movies. Hackers know this and are beginning to incorporate Oscar Nominated movies into their strategies. They’re using enticing images to bait unsuspecting users to install malware and lure them to phishing sites designed to steal credit card and other sensitive information. After all, wouldn’t […]
New Healthcare Breach Blamed On Stolen Laptop
There have been a dizzying number of high-profile data breaches in recent months, and now we have one more to add to the growing list. Health Share of Oregon is a Medicaid Coordinated Care Organization. They recently disclosed that they lost control of health and personal information belonging to more than 650,000 people. The root […]
Internet Explorer Security Update Causing Some Issues With Printing
On January 17th of this year (2020), Microsoft discovered and disclosed the existence of a zero-day vulnerability. It was present in Internet Explorer versions 9 through 11. Hackers could display specially crafted websites that would allow them to remotely execute commands on a site visitor’s computer without their knowledge. That is, if they browsed the […]
Wawa Data Breach Includes Information On 30 Million Customers
Another week, another high-profile data breach. This time, it’s a big one. In December 2019, the convenience store chain Wawa disclosed that they had discovered malware on their point of sale system and that tens of millions of customer records were at risk. Those at risk were potentially anyone who had paid for their gas […]
Shlayer Malware Continues To Attack Mac Systems
If you’re a Mac user, you may have heard of the malware known as Shlayer. It first made headlines in the early part of 2018. The malware is primarily used to install malicious adware on infected systems that spam an unreasonable number of popups. The popups generate ad revenue for the malware’s controllers. The malicious […]
Data Breach Hits Microsoft Customer Service Database
Over the last twelve months, we’ve heard reports from companies of all shapes and sizes that have suffered from data breaches. Many of them were caused by an act of carelessness on the part of an employee that accidentally left an important database exposed to the world. It raises eyebrows though, to hear that Microsoft […]
Active DirectoryBeing Targeted By Malware Called TrickBot
The malware named TrickBot has some new tricks up its sleeves. Recently, a new strain of the malware was spotted in the wild with new capabilities that allow it to target the Active Directory database stored on compromised Windows domain controllers. While TrickBot has never been seen as one of the most dire threats in […]
New IRS Tax Scammers Use Personal Data For Big Returns
Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns with the IRS. He was able to gain enough information to file more than two thousand income tax returns that attempted to claim […]
New Ransomware Leaks Confidential Data To Public
There’s a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won’t pay, their data that was stolen and encrypted is being published for all to see. KrebsOnSecurity recently identified a website associated with the creators of the Maze ransomware strain that […]
New Malware Sends Offensive Texts From Your Phone
Malware tends to be at its most effective when it exists in secret. Under the radar. This is what allows malicious code to burrow deep into an infected system and capture a wide range of data. It’s what allows cryptojacking software to quietly siphon off computer power to mine for various forms of cryptocurrency. That […]
iPhone Now Works As A Security Key For Google
Google continues to improve security and its user experience in the Apple ecosystem. The most recent update to the company’s Smart Lock app on iOS allows users to use their iPhone as a physical security key (if and where two factor authentication technology is enabled). Once it’s set up, it works like this: If you […]