Security

Selling Your Personal Info to the Dark Side

The Dark Side of Social Apps Selling Your Personal Information Primary Concerns Social apps have become indispensable in today's interconnected world, seamlessly integrating into our daily lives. But lurking beneath this convenience is a dark reality that poses grave risks to personal privacy. When social apps sell your personal information, the consequences can be devastating. [...]

Violations of Security Rule Costs Montefiore Medical Center $4,750,000

The U.S. Department of Health and Human Services (HHS) and Office for Civil Rights (OCR) have settled with Montefiore Medical Center regarding potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. The settlement involves a $4.75 million monetary penalty and corrective actions to address various data security failures at Montefiore Medical [...]

2024-06-11T15:50:17-05:00Security|0 Comments

Open Source Hero: Dodging a Malicious Bullet

Have you ever heard of XZ Utils? It's a handy tool for data compression in Linux systems that's widely used but not well-known outside the world of open-source software. However, last week, security experts uncovered a serious flaw in XZ Utils that could leave networked Linux computers open to malicious attacks. This vulnerability is no [...]

2024-04-04T12:13:44-05:00Cybersecurity, Security|0 Comments

Protecting Router Security

Combatting the Volt Typhoon Campaign: Proactive Steps for Router Security In light of recent cyber incidents, a comprehensive guide has been issued by the Cybersecurity And Infrastructure Security Agency (CISA) and the FBI to help owners of vulnerable routers bolster their protection. This advice is critically pertinent for home office workers and small to medium-sized [...]

2024-02-13T16:23:25-05:00Cybersecurity, Security|0 Comments

How Hackers Are Shaping the Russia-Ukraine War – Karmic Prospective

The ongoing conflict between Russia and Ukraine has been marked by a series of cyberattacks that have targeted both sides of the border. From disrupting government websites and radio stations to sabotaging food supply chains and critical infrastructure, hackers have been playing a significant role in the war, both as allies and enemies of the [...]

FBI Deletes Hundreds of Criminally Installed Shells

Remote-control malware wiped from Microsoft Exchange Servers by FBI The FBI deleted web shells installed by criminals on hundreds of Microsoft Exchange servers across the United States, it was revealed on April 13, 2021. The Feds were given approval by the courts to carry out the deletions, which occurred without first warning the servers' owners, [...]

Rethinking Apple Security

Malware monsters target Apple's M1 chip with 'Silver Sparrow' US security consultancy Red Canary says it has found MacOS malware written specifically for the shiny new M1 chip that Apple created to power its post-Intel Macs. Red Canary has named the malware "Silver Sparrow" and says it had found its way onto almost 30,000 MacOS [...]

Organizations Infected Sunburst Malware in the Aftermath of the SolarWinds Supply Chain Attack

Multiple security researchers and research teams have published over the weekend lists ranging from 100 to 280 organizations that installed a trojanized version of the SolarWinds Orion platform and had their internal systems infected with the Sunburst malware. The list includes the names of tech companies, local governments, universities, hospitals, banks, and telecom providers. The [...]

FireEye, Top Cybersecurity Firm, Hacked by Russian GRU

For years, the cybersecurity firm FireEye has been the first call for government agencies and companies around the world who have been hacked by the most sophisticated attackers, or fear they might be. Now it looks like the hackers — in this case, evidence points to Russia’s intelligence agencies — may be exacting their revenge. [...]

Homeland Security Warns U.S. Businesses About Risks of Exposure to China Tech

The United States Department of Homeland Security (DHS) has published a guide to the terrifying risks that businesses will expose themselves to if they use tech created in the Peoples’ Republic of China (PRC) or engage in any business activity with the Middle Kingdom. The fifteen-page “Data Security Business Advisory” [PDF] opens by warning “Businesses [...]

Go to Top