by Luana PASCU, from HotForSecurity , on 22.10.2018
The government’s sign-up system for healthcare plans fell victim to a data breach, affecting the sensitive information of some 75,000 individuals, confirmed a press release from The Centers for Medicare and Medicaid Services on Friday. The tool is used by insurance agents and brokers that help US citizens sign up for insurance plans, so naturally [and#8230;] read more
by Bogdan BOTEZATU, from Bitdefender Labs , on 22.10.2018
We’re happy to announce the release of a new decryptor for victims of GandCrab ransomware. The tool can only be used by a limited pool of victims located in Syria, and works for GandCrab ransomware versions 1 through 5. At the tool’s core is the roughly 1000 decryption keys deliberately released by the group behind […] read more
by Business Insights , on 22.10.2018
Even though technology budgets have increased, companies are still vulnerable to attacks due to a major cybersecurity workforce gap. For some reason, the gap has widened to a staggering 3 million across North America, Latin America, Asia-Pacific (APAC), and Europe, the Middle East and Africa (EMEA), according to a study by (ISC)2. To reach this conclusion, a number of factors were analyzed, including how many organizations have cybersecurity roles open. read more
by Graham CLULEY, from HotForSecurity , on 20.10.2018
In August 2017, Sudhakar Reddy Bonthu, a production development manager in Equifaxand#8217;s software management team was given a project codenamed and#8220;Sparta.and#8221; Bonthuand#8217;s bosses told him that the project was for one of the companyand#8217;s clients, and involved building an online user interface that would allow the clientand#8217;s own customer to determine if they had been [and#8230;] read more
by Filip Truta, from Business Insights , on 19.10.2018
Businesses with a good understanding of the latest cyber-security solutions and data protection laws are reaping the payoff in terms of significant revenue growth, according to a report by Oxford Economics. read more
by Razvan Muresan, from Business Insights , on 18.10.2018
Failure to detect an advanced cyberattack or a targeted threat as soon as it occurs may lead to full infrastructure compromise, irreversible data loss, and financial repercussions from which some companies may never recover, according to a Bitdefender survey of 1,050 CISOs in the US and Europe. read more
by Business Insights , on 17.10.2018
Anthem, the second-largest health insurer in the US, will pay $16 million to the US Department of Health and Human Services, Office for Civil Rights following a data breach that exposed the electronic protected health information (ePHI) of almost 80 million people. Anthem will also initiate a corrective action plan to include thorough risk analysis and regular reporting. read more
by Luana PASCU, from IoT Security Insights , on 17.10.2018
The Department for Digital, Culture, Media and Sport (DCMS) and the National Cyber Security Centre (NCSC) in the UK have released a voluntary Code of Practice that applies to device manufacturers, retailers, IoT service providers and mobile application developers. This is a positive sign that the security industry is not the only entity aiming to ...
The post UK Government releases voluntary Code of Practice for IoT devices and service providers appeared first on Bitdefender.
by Luana PASCU, from HotForSecurity , on 17.10.2018
Madison County in Idaho fell victim to a ransomware attack last week, after an employee opened a phishing email asking for money. The IT department spent the week recovering the computer system from the attack, which took place over the three-day Columbus Day weekend. The entire county network was affected, including payroll systems, sanitation services [and#8230;] read more
by Ionut ILASCU, from IoT Security Insights , on 16.10.2018
Internet-of-Things devices are a boon for cybercriminals in ways that don’t necessarily directly impact the owner. Connected gadgets you have hooked to the home network can help crooks hijack online accounts of other people. The power of smart gadgets is enough to automate a process known as a credential stuffing attack. Convenience is a big ...
The post Automating Online Hijacking Attacks appeared first on Bitdefender.