Blog

Blog

University of Iowa Health Care Notifies Patients of Data Breach

The University of Iowa Health Care (UIHC) has notified thousands of patients of a data breach that exposed their personal and medical information. On 22 June, UIHC sent out notification letters to 5,300 patients affected by the data breach. The University explains in these letters that it has not found any evidence suggesting bad actors misused...
Blog

The Costs of Three Major Email Security Breaches

Email is integrated into nearly every aspect of our lives, everything from business to banking to health and beyond. As such, our email accounts are some of the most precious digital assets we have. Currently, there are 4.9 billion email addresses worldwide. In just two years, there have been 6,789 email data breaches globally, according to Avatier...
Blog

Risk of Security: Why a Security Measure Is Needed & How It's Achieved

The Phoenix Project was an easy and enjoyable read about Bill Palmer, a manager in the IT department who unexpectedly gets promoted to VP of IT Operations. To succeed in this new role, Bill had to expand his view from just his group to the organization as a whole in order to master the "Three Ways" for how to evolve from a dysfunctional group of...
Blog

Cyber Security Heroes Part 2: David Prince

They say you should never meet your heroes—often they will just disappoint you. But thankfully, there are also exceptions to this rule. In this five-part series, I will be introducing you to five of my key cyber security/infosec heroes. These individuals inspire me to continuously strive for more, with one even motivating me to move across the pond....
Blog

VERT Threat Alert: July 2017 Patch Tuesday Analysis

Today’s VERT Alert addresses the Microsoft July 2017 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-733 on Wednesday, July 12th. In-The-Wild & Disclosed CVEs CVE-2017-8584 In a Patch Tuesday first, we have a HoloLens code execution vulnerability. This vulnerability impacts Windows 10 and...
Blog

Hijacker Hits Radio Station with "The Winker's Song" Rogue Broadcasts

A hijacker has hit a radio station with a series of rogue broadcasts containing "The Winker's Song" by comedy band Ivor Biggun. Mansfield 103.2, an independent local radio station in Mansfield, Nottinghamshire, has suffered eight hijacking attacks since June 2017. In each of those offensives, the responsible party is believed to have used a mobile...
Blog

Book Review: The Phoenix Project

The Phoenix Project, A Novel about IT, DevOps, and Helping Your Business Win might seem like a “techies-only” read at first glance, but it’s really a story that all business leaders (yes, even the technology-challenged) should invest in. Bill Palmer plays the hero of this fictional (yet all too realistic) story about a business dangerously close to...
Blog

Project Mayhem: Combating IRS/Tech Support Scams with Dubious Means

IRS scams and tech support scams are two of the most well-known fraud schemes preying on users today. In the former, bad actors cold-call unsuspecting individuals and tell them they'll go to prison and/or lose their assets unless they call back and agree to pay back taxes owed to the Internal Revenue Service (IRS). The latter leverages a fake...
Blog

Hard Rock Hotels & Casinos Warns of Seven-Month Payment Card Breach

Hard Rock Hotels & Casinos is, once again, warning customers of a data breach that may have compromised their payment card information. In a press release last week, the popular hotel, resort and casino franchise announced it was recently alerted of a security incident through its third-party hotel reservation system – Sabre Hospitality Solutions...
Blog

Fake Facebook Warning Urges Users to Decline Jayden K Smith Hacker

A fake Facebook message is urging users to not approve a friend request submitted by hacker who goes by the name Jayden K Smith. This hoax has many variants. All versions say the same thing: don't approve Jayden K Smith as friend or they'll hack a user's account, target their Facebook friends, and thereby spread their influence. Craig Charles of...
Blog

Brainwashing Embedded Systems IoT Hack Lab Update

I’ve been studying the security designs of various embedded devices for the past couple of years. This research has led me to uncover dozens of critical flaws in internet-connected devices ranging from enterprise NAS devices and access points to countless consumer products like wireless routers, home automation controllers, security cameras and more...
Blog

Man Admits to Phishing for Bitcoins on Dark Web Forums

A man has admitted that he committed fraud and money laundering as part of a phishing scheme to steal Bitcoins on dark web forums. On 27 June 2017, Michael Richo, 35, of Wallingford, Connecticut pleaded guilty in federal court to one count of access device fraud and one count of money laundering. The former offense carries a maximum sentence of 10...
Blog

Security Risks to Consider When Deploying Containers on Docker

Docker – a platform for OS-level virtualization instances known as containers – has become a hugely popular infrastructure technology. Flexible containerization is completely changing the way we build and maintain applications at scale, with analyst group RedMonk identifying the large enterprise market as a key driving force. Towards the end of...
Blog

Last month's malware outbreak cost this household company £100 million

Reckitt Benckiser, the household goods manufacturer of such famous products as Nurofen painkillers, Durex condoms, Dettol, and Harpic, has warned that it was hit hard by the June 27th global malware outbreak which struck power plants, airports, and government agencies in Ukraine before spreading to other multinational firms. In a sales warning for...
Blog

Snap Map Feature Stirs Privacy Concerns among Parents and Schools

Snapchat's new Snap Map location-sharing feature is stirring concerns among parents and schools for the privacy and safety of their children. Launched on 21 June 2017, Snap Map allows Snapchat users to view publicly shared "Snaps" (photos and videos) from around the world. They can also use it to share their exact location with their "friends". The...
Blog

Why Small Businesses Don’t Care About Cyber Security

With millions of small businesses out there, why don’t they care about cyber security? You may be reading this and own a small business or know someone that does. Think to yourself: why would small businesses not care about cyber security? You may find that it is not a problem of caring but a problem of understanding. Let’s take a look at some of...
Blog

June 2017: The Month in Ransomware

When it seemed that ransomware authors hit the lowest of the low with their attacks a long time ago, they managed to take it a notch further last month. With the revamped Petya Trojan that surfaced on June 27, the crooks broke new ground and started waging a real cyber war against a particular country. This toxic code renders computers inoperable,...