Call 980-407-5488
Blog
May 18, 2018 by Vertical Axion
The Department of Health and Human services has issued a warning to healthcare providers to be on high alert for the SamSam strain of ransomware, which has been used to attack eight different health care entities so far this year. SamSam made its first appearance in 2016 and is seeing increasingly widespread use so far […]
Read more »
Tagged
May 17, 2018 by Vertical Axion
Twitter shot itself in the foot recently but is working hard to get out in front of the problem. According to a recent blog post, the company experienced an issue with its hashing routine – a process which masks user passwords, making them virtually impossible to crack. Because of the issue, user passwords were stored […]
May 14, 2018 by Vertical Axion
Thanks to researchers Daan Keuper and Thijs Alkemade (who work at the Dutch cyber-security firm Computest), newly produced Golf GTE and Audi A3 vehicles are a little bit safer, and a lot less vulnerable to remote hacks. The duo found that by taking advantage of these vehicles’ WiFi connection, they could access the cars’ IVI, […]
May 12, 2018 by Vertical Axion
Score one for the good guys, but with hesitation. Unfortunately, in today’s fast-moving digital world, even a victory doesn’t mean the end of a problem. Recently, a pair of researchers (Tomi Tuominen and Timo Hirvonen of F-Secure) released information about a new hack they had discovered. It takes advantage of a critical security flaw in […]
May 10, 2018 by Vertical Axion
Security researcher Assaf Baharav from Check Point Security has discovered a new twist on an old, fairly well-known attack. He was able to essentially “weaponize” PDFs to steal Windows credentials stored in NTLM hashes. Unfortunately, no action other than simply opening the PDF is required for the hacker to gain access to the information. Baharav […]
May 9, 2018 by Vertical Axion
Owners of Apple devices have a new attack vector to worry about, called “TrustJacking.” Symantec researchers recently stumbled across a pair of scenarios that take advantage of Wi-Fi syncing of various Apple devices. These are scenarios that also take advantage of the trust users have in the security of their own devices, allowing hackers to […]
May 8, 2018 by Vertical Axion
File this one away under self-inflicted wounds. It has recently come to light that a company called LocalBox left a massive data file vulnerable on a cloud server. The data file was more than a terabyte in size and contained detailed psychometric profiles of more than 48 million people. LocalBox describes itself as a combination […]
May 7, 2018 by Vertical Axion
Recently, a new strain of malware called “SquirtDanger” has been found by researchers at Palo Alto Networks Unit 42, and it’s a particularly nasty one for a couple of reasons. First and foremost, the owner of the malware isn’t orchestrating campaigns himself, but rather, selling his product as a commodity on the Dark Web. That […]
May 4, 2018 by Vertical Axion
Atlanta-based SunTrust Bank is the 12th largest bank in the US. They have a major problem, and so do roughly a million and a half of its customers. According to CEO William Rogers, an unidentified employee of the firm printed a vast amount of private customer information, including their names, addresses, phone numbers and account […]
May 2, 2018 by Vertical Axion
Do you do your banking online? If so, there’s bad news in the form of a report recently released by the security firm “Positive Technologies.” The company tested a variety of websites using a proprietary tool they developed in-house, which scans websites for security flaws. While flaws were found across a wide range of […]
May 1, 2018 by Vertical Axion
Score one for the good guys. A researcher from BrilliantIT was recently able to figure out how infected computers would connect to EITest’s command and control server, and using that information, was able to bring down their entire network. If you haven’t heard of EITest before, the true significance of that statement might not be […]
April 28, 2018 by Vertical Axion
Beware of compromised routers spreading malware. This is according to both Kaspersky Labs and a recently released government report. Using hacked routers to spread malware is nothing new. Security insiders have known about it for years. However, since 2008, the number of instances where routers are being used to push malicious code has been steadily […]
April 26, 2018 by Vertical Axion
If you have an air-gapped computer, you probably think you’re safe. You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine. Unfortunately, you’d be incorrect. Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data […]
April 25, 2018 by Vertical Axion
If you’re downloading software from the web, be careful. Take the extra step of verifying that you’re on the developer’s website, because the hackers have a new trick up their sleeve. It’s actually a deceptively simple one. Hackers are buying ads on Google and Bing’s search engines, with the links in their ads pointing to […]
April 24, 2018 by Vertical Axion
Panera Bread company is the latest to find itself in hot water. Recently, security researcher Dylan Houlihan discovered that the company had failed to encrypt (or otherwise protect) a file containing usernames, email addresses, physical addresses, phone numbers and loyalty account numbers for a staggering thirty-seven million of its customers. The file was found stored […]
April 23, 2018 by Vertical Axion
The bad news just doesn’t seem to stop where Intel and the Speectre vulnerability are concerned. The latest bit of news comes directly from Intel, as the company admits that it’s just not possible to address the Spectre vulnerability in some of its older hardware. This means that nine families of chips and more than […]
April 21, 2018 by Vertical Axion
Microsoft recently made small but significant changes to its Office 365 subscription service and to OneDrive, which are often used in tandem. The goal is to make it easier for users whose files have been encrypted by ransomware (or otherwise corrupted) to recover them. The most significant of the changes is a new button that […]
April 20, 2018 by Vertical Axion
First it was 55 million. Then 77 million. Now, it’s 2.2 billion, or pretty much every user on Facebook. That’s how many people should assume that their public profile information has been scraped. The conversation began when it came to light that Cambridge Analytica (a political research firm) had misused Facebook’s search function to scrap […]
April 19, 2018 by Vertical Axion
Delta Airlines and Sears Corporation have both been notified of a data breach that has exposed the credit card information of some 100,000 Sears customers and “hundreds of thousands” of Delta customers. Neither Delta nor Sears were breached directly. A live chat service called [24]7 (used by both companies), was breached, allowing access to Sears […]
April 17, 2018 by Vertical Axion
Last year’s Wannacry attack was bad, but in many ways, it was a self-inflicted wound. According Webroot’s recently published “Annual Threat Report,” almost all of the machines that succumbed to the Wannacry attack were running Windows 7. That attack is estimated to have caused in excess of $4 billion in total losses. The central problem […]
April 16, 2018 by Vertical Axion
Congratulations to Adobe Flash Player for not being the software most targeted by hackers. Security vendor “Recorded Future” has just published their annual list of the software hackers most commonly focus on when targeting computers and handheld devices for attack. For the last several years, Adobe’s Flash Player has topped the list, but this year […]
April 14, 2018 by Vertical Axion
The energy sector is in danger, and almost nobody is talking about it. This, according to a newly published report by Kaspersky Labs. At issue are ICS (Industrial Control System) computers. Hackers are increasingly targeting them, having recently been given a robust set of tools to do so. Recall that in 2010, Kaspersky Labs uncovered […]
April 13, 2018 by Vertical Axion
How much of your website’s traffic is driven by bots? The answer may surprise you. Overall, bots account for nearly half of all web traffic. The “good” bots account for 20.4 percent, and “bad” bots account for 21.8 percent. Hackers, scammers and fraudsters commonly use bad bots to scrape content, test stolen account credentials, issue […]
April 7, 2018 by Vertical Axion
There’s a new type of hacking attack to be concerned with, and it’s growing by leaps and bounds. Called “Crypto-Jacking,” it’s a process by which malicious code is placed on websites. When the sites are visited, the code secretly siphons off a portion of the affected user’s PC, laptop, or smartphone’s processing power and uses […]