Category:

Hackers Laser-Target Arkansas Small Town With Ransomware

According to local news provider KARK, local businesses in Conway, Arkansas, have been hit with a ransomware attack. Some of the businesses have reportedly lost thousands of dollars. Companies impacted by the attack don’t want to go public, but KARK is reporting that multiple files have been encrypted by hackers who are demanding a ransom in exchange for the returned files. Meanwhile, Brian Fletcher, owner of Fixed by Fletcher, a local IT company, has been speaking out to try and help others prevent or recover from an attack. One of Fletcher’s customers, whom he declined to Continue Reading

Posted On :
Category:

Criminals are using social engineering on local businesses

We just got this pretty alarming message from the Hawaii State Procurement Office: The Judiciary has notified the State Procurement Office (SPO) regarding an unknown third party (Perpetrator) impersonating a government employee. The perpetrator is contacting vendors by phone or by email and is issuing fraudulent purchase orders, which appears as if signed by a government employee. On acceptance of the purchase order, the goods are sent to an unknown third party, typically a forward shipping company. Fortunately the vendor in this instance, determined the purchase order was fraudulent and Continue Reading

Posted On :
Category:

Coming Soon: Medical Device Cyber Attacks

The cybersecurity of connected medical devices – notoriously poor for decades – should finally start to improve. That is genuinely good news. But it is tempered by the reality that it will not happen quickly. The long-overdue change is coming thanks to the federal Food and Drug Administration’s (FDA) announcement in June that it was adopting UL 2900-2-1 as a new “consensus standard” for better software security in new devices, in order for them to qualify for “premarket certification.” That is expected to have a major impact – for good – on both the Continue Reading

Posted On :
Category:

Extensive personal data leaked about every American by a company you’ve never heard of

I’m not sure if you check the Dark Web as often as I do – you know, the black market of the Internet where rogue military groups, drug and human traffickers do all their business. Either way, I came across an interesting breach earlier this week from Exactis that is potentially the scariest I’ve seen. Exactis you ask? I hadn’t heard of them either. But they are just one of many data aggregation companies that create profiles about people based on their browsing patterns, social media, shopping and even driving patterns, Continue Reading

Posted On :
Category:

LIVE (replay) Hurricane Lane EMERGENCY Tech Session

 As you know hurricane Lane is coming fast. We did a special EMERGENCY community forum yesterday on how to make sure your business can continue to function when the hurricane hits and in case you missed it, here is the YouTube video replay. In the session we offer guidance on: * Managing power interruptions and surges * Managing internet & phone interruptions * Managing staff shortages, chain of command * Using tech to continue operating when facilities are damaged It’s our way of helping to educate and protect the community because we Continue Reading

Posted On :
Category:

Banks and Retailers Are Tracking How You Type, Swipe and Tap

When you’re browsing a website and the mouse cursor disappears, it might be a computer glitch — or it might be a deliberate test to find out who you are. The way you press, scroll and type on a phone screen or keyboard can be as unique as your fingerprints or facial features. To fight fraud, a growing number of banks and merchants are tracking visitors’ physical movements as they use websites and apps. Some use the technology only to weed out automated attacks and suspicious transactions, but others are Continue Reading

Posted On :
Category:

Fraud Alert for Local Hawaii Businesses

A new scam is afoot you should know about as it is targeting local Hawaii businesses. The Judiciary has notified the State Procurement Office (SPO) regarding an unknown third party (Perpetrator) impersonating a government employee. The perpetrator is contacting vendors by phone or by email and is issuing fraudulent purchase orders, which appears as if signed by a government employee. On acceptance of the purchase order, the goods are sent to an unknown third party, typically a forward shipping company. Fortunately the vendor in this instance, determined the purchase order Continue Reading

Posted On :
Category:

Microsoft Edge Flaw Lets Hackers Steal Files From Your Computer

Microsoft has fixed a vulnerability in the Edge browser that could be abused against older versions to steal local files from a user’s computer. The good news is that social engineering is involved in exploiting the flaw, meaning the attack cannot be automated at scale, and, hence, present a smaller level of danger to end users. Edge flaw is SOP-related Discovered by Netsparker security researcher Ziyahan Albeniz, the vulnerability involves the Same-Origin Policy (SOP) security feature that all browser support. In Edge, and all other browsers, SOP works by preventing an attacker Continue Reading

Posted On :
Category:

LifeLock Bug Exposed Millions of Customer Email Addresses

Identity theft protection firm LifeLock — a company that’s built a name for itself based on the promise of helping consumers protect their identities online — may have actually exposed customers to additional attacks from ID thieves and phishers. The company just fixed a vulnerability on its site that allowed anyone with a Web browser to index email addresses associated with millions of customer accounts, or to unsubscribe users from all communications from the company. The upshot of this weakness is that cyber criminals could harvest the data and use it in Continue Reading

Posted On :
Category:

Major International Airport’s Security System Found for Sale on Dark Web

The closest many of us get to the dark web is watching hackers surf it in television shows or movies. However, it is a very real place that contains lots of stolen data. This data, along with compromised systems, devices, and more are often sold in underground marketplaces that exist on the dark web. One type of marketplace is called a remote desktop protocol (RDP) shop, which provides access to stolen systems for a small fee. Found in one of these RDP shops by McAfee’s ATR team: a major international airport’s security Continue Reading

Posted On :