TweakTown NewsRefine News by Category:
A rather shocking 43 percent of identity theft cases last year can be traced back to medical identity theft, as security experts and healthcare providers struggle to keep up with security challenges, according to a recent study.
Unfortunately, medical records are significantly more lucrative to cybercriminals, meaning it's a popular target for attacks.
"Despite concerns about employee negligence and the use of insecure mobile, 88 percent of organizations permit employees and medical staff to use their own mobile devices such as smartphones or tablets to connect to their organization's networks or enterprise systems such as email," according to the Ponemon Institute's Fourth Annual Patient Privacy and Data Security report.
Many healthcare companies and hospitals embrace "bring your own device," but don't require any type of anti-virus or anti-malware security software - an alarming rate when 88 percent of companies rely on employees to use their own smartphones on the job.
Android had a greatly successful year in 2013, capturing around 87 percent of the international smartphone market - but during the same year, the Android community had to deal with a large amount of malware and security threats.
Ninety-seven percent of current mobile malware targets Android, and users will continue to face a large amount of threats moving forward.
Security company F-Secure recommends sticking to the Google Play Store to download apps, as one in every 1,000 apps might have had malware - while purchasing or downloading apps from other sources can easily lead to malware infection.
Cybercriminals rely on malware for both targeted attacks and to try and infect as many people as possible.
In the world of gun safety, companies are scrambling to try and manufacture some type of technology to prevent accidents - and from stolen weapons used in later crimes - but there haven't been a lot of easy answers. The Identilock biometric authentication technology, created by Omer Kiyani, a gunshot victim from Detroit, provides an added layer of handgun security.
The lock connects to a handgun's trigger and uses biometric authentication to ensure only the authorized gun owner is able to disable the lock - which takes less than one second from initial contact on the fingerprint sensors.
"The key is reliability," said Kiyani, when speaking to CNN. "The sensor has proved itself in different sectors over the past few years and the market is aware of its capability. The main point of firearms ownership is home defense, and home defense means quick access. But the other side of that is accidents."
Kiyani isn't interested in trying to get into a debate regarding gun ownership, rather wants to create a safe, easy-to-use locking mechanism.
The "Coinkrypt" malware is making its rounds, infecting Google Android devices, letting cybercriminals mine Litecoin, Casinocoin and Dogecoin courtesy of hijacked devices.
Most malware today is designed to either steal information or create some type of financial incentive for criminals - and Coinkrypt follows that same strategy, but with a rather unique twist.
Although it isn't prevalent at the moment, security researchers want users to be aware of the potential ramifications if they are infected - including potentially causing batteries to drain faster - or eventually leads to overheating.
"While mining as a strategy hasn't paid off for these malware authors, as these digital currencies continue to grow, we predict that the number of new malware families targeting them will also continue to grow as malware authors experiment with various different strategies in their desire to cash in," a blog by security firm Lookout indicates.
The legal woes for popular retailer Target continue to mount, with Green Bank NA and Trustmark National Bank filing a class-action lawsuit, accusing the company of not properly securing customer data. Also named in the suit was Trustwave Holdings, a company specializing in credit card security services, with other complaints likely in the immediate future.
Target outsourced data security operations to Trustwave, and "failed to live up to its promises or to meet industry standards," the suit claims.
Target already faces numerous class-action lawsuits from customers affected by the data breach, so this will only further rack up the legal fees. In addition, disclosures indicating Target may have known about a potential security breach - and ignored numerous security warnings from internal IT - will add fuel to the fire.
Target was the biggest breach, but other retailers have been hit with various types of malware, targeting point-of-sale registers, online stores, and company records.
The Bennington Area Chamber of Commerce recently suffered a major annoyance after needing to spend $5,000 to upgrade PCs, servers and HDDs that were crippled by the Cryptolocker ransomware.
The chamber wanted to pay the ransom but suffered a power failure, losing the connection with the Cryptolocker cybercriminals.
"We had to replace our entire computer system because of it," said Joann Erenhouse, Bennington Area Chamber of Commerce director, in a statement to local media. "Right now we are just about up and running."
Similar to other forms of malware, users are the first line of defense, but tend to be too fast to read emails and open attachments from unknown sources.
Cryptolocker is an especially tricky piece of ransomware, with infected users typically forced to pay the ransom - or restore from what hopefully was a recent backup. Almost 40 percent of affected companies choose to pay the ransom, which is typically pay $500-$750 - or face having files permanently encrypted.
In a double whammy, the Fareit Trojan targeting Microsoft Windows PCs also has been found to spread the Cribit ransomware, as security researchers transition to defend against sophisticated cyber threats.
There are two versions of Cribit in the wild - one version encrypts files on the infected PC and shows an English ransom, while the other version has messages also available in Chinese, French, Arabic and Spanish, researchers note.
"After all, cybercriminals are after one goal: to get a person's money," said Christopher Budd, Trend Micro threat communications manager, in a statement to SC Magazine. "Returning/decrypting a victim's files won't certainly be a priority or major concern for these people. Additionally, paying the ransom may encourage and help expand the operations of cybercriminals."
Cybercriminals are gladly enjoying the use of sophisticated malware to compromise devices, in an effort to steal information - and now to demand monetary payments for releasing a computer from malicious and disruptive software.
The Ethiopian national government is using foreign technology to compromise PCs and phones of political opponents, according to a recent study released by the Human Rights Watch (HWR). Not surprisingly, government officials disregarded the security report, saying it's just a smear campaign, with growing concern of government oppression.
The hardware used to carry out cyber surveillance originally stemmed from China, Italy, Germany, and the United Kingdom, the report states. To make matters worse, all phone and Internet access within the country's borders are provided through a single company, which is state-owned.
"Repressive measures aimed at restricting freedom of expression and association, as well as access to information, have increased since the controversial 2005 elections," the report states. "These measures include the harassment, arbitrary detention, and prosecution of opposition leaders, journalists, and activists."
The report also makes independent recommendations to the Ethiopian government, international companies operating in the African country, foreign national governments, and the World Bank.
Security company Avast Software today launched its GrimeFighter PC cleanup tool, designed to help boost PC performance.
GrimeFighter boots into Linux to better detect and remove problems that aren't as easily noticeable with Microsoft Windows running. The software is a standalone product available now, with the Avast website offering a free scan.
"Most PC-cleanup utilities don't really improve performance - some actually slow down PCs," said Vince Steckler, Avast CEO, in a press statement. "Since they run in Windows, they are unlikely to find problems with files and registry entries that are locked, protected, or otherwise hidden. Ironically those are the ones most often robbing users of performance and stability. With avast! GrimeFighter, we didn't want to introduce another me-too product - we wanted to eliminate the problem of slow PCs."
There are a handful of legitimate and free PC optimization tools - but AVAST is a well-known, reputable company - and GrimeFighter's ability to build a cloud-based threat intelligence database further improves dependability.
In a growing effort to defend against cyberattacks, global alliances between nations with same political influences are carving out curious battle lines.
"It is true that allies need to share military intelligence to counter threats posed by North Korea in light of its nuclear test and missile launches,"said Kim Min-seok, South Korea defense ministry spokesperson, during a preference conference. "Although working-level officials had considered the memorandum of understanding as one idea, the move is currently not under way as the situation is not yet ripe for that."
North Korea also has a blossoming cyberattack program, focusing mostly on targeting South Korea and Japan.
Both South Korea and Japan face growing political tensions from China and North Korea - and while most of the attention is rightfully on physical military force - all four countries must defend against cyberattacks from foreign sources.