A box containing confidential client health information disappeared from an office at KidsPeace’s Schnecksville facility, but the agency says it believes the records were not “inappropriately” removed or accessed.
It won’t surprise anyone who follows data security to know that this past summer saw a hack of databases containing Louisiana driver information. A hacker going by the ironic handle “NSA” offered the data for sale on a “dark web” marketplace.
University Gastroenterology and its 19 offices were victims of a data hacking scam, where an individual gained access to the network, copied information for 14,000 patients and then encrypted it, NBC reports.
Here’s what you need to know.
1. Patient names, addresses, dates of birth, Social Security numbers and medical billing information were all taken by a hacker. The data was then encrypted and returned. The hacker is asking for a cash sum to unencrypted the data.
2. UGI notified the affected patients through a letter.
3. There is no evidence the data has been misused.
4. The person had gained access to patient files from a practice UGI acquired in 2014.
5. UGI has made security enhancements to ensure their systems are safe.
6. The center has also established a call center to answer patients questions and concerns about the hack at 844-575-7459. The center is also offering credit monitoring protection through Equifax to the impacted patients.
Find the Original Article Here
The data breach has exposed plaintext passwords, usernames, email addresses, and a large trove of other personal information of more than 6.6 Million ClixSense users.
ClixSense, a website that claims to pay users for viewing advertisements and completing online surveys, is the latest victim to join the list of “Mega-Breaches” revealed in recent months, including LinkedIn,MySpace, VK.com, Tumblr, and Dropbox.
Hackers are Selling Plaintext Passwords and Complete Website Source Code
More than 2.2 Million people have already had their personal and sensitive data posted to PasteBin over the weekend. The hackers who dumped the data has put another 4.4 Million accounts up for sale.
In addition to un-hashed passwords and email addresses, the dump database includes first and last names, dates of birth, sex, home addresses, IP addresses, payment histories, and other banking details of Millions of users.
Troy Hunt, operator of Have I Been Pwned? breach notification service, verified the authenticity of the data taken from ClixSense.
Besides giving away 4.4 Million accounts to the highest bidder, the hackers are also offering social security numbers of compromised users, along with the complete source code of the ClixSense website and “70,000 emails” from the company’s internal email server, according to a Pastebin message advertising the stolen database.
PasteBin has since removed the post as well as the sample of the compromised database that contained user account information.
Here’s How Hackers Hacked ClixSence:
ClixSense admitted the data breach and said some unknown hackers were able to get access to its main database through an old server which the firm was no longer using, but at the time, still networked to its main database server.
After gaining access, the hacker was able “to copy most, if not all” of the ClixSense users table, ran SQL code to change account names to “hacked account,” deleted several forum posts, as well as set account balances of users to $0.00.
While talking to Ars Technica, ClixSense owner Jim Grago admitted that the database contained entries for roughly 6.6 Million accounts and that the company became aware of the breach on September 4 and managed to regain control of their DNS over the weekend.
“This all started last Sunday, September 4th about 5 am EST when my lead developer called me and said ClixSense was redirecting to a gay porn site. The hackers were able to take over our DNS and setup the redirection,” Grago wrote.
“On Monday (Labor day) they were able to hack into our hosting provider and turned off all of our servers, hacked into our Microsoft Exchange server and changed the passwords on all of our email accounts. On Tuesday they were able to gain access to a server that was directly connected to our database server and get a copy of our users table.”
Change Your Passwords and Security Questions Now
Users are strongly advised to change their passwords for ClixSence account immediately, and it would also be a good idea to reset passwords for all of your other online services, especially those using the same passwords.
Since ClixSense uses a large trove of personal information on its users, make sure you change your security questions, if it uses any of the information you provided to ClixSense, such as your address, date of birth, or other identifying information.
Moreover, I recommend you to use a good password manager to create strong and complex passwords for your different online accounts, and it will remember all of them on your behalf.
I have listed some of the best password managers that could help you understand the importance of password manager and choose one according to your requirement.
Around 324,000 users have likely had their payment records stolen either from payment processor BlueSnap or its customer Regpack; however, neither of the company has admitted a data breach.Continue Reading…
The World Anti-Doping Agency (WADA) on Tuesday said a Russian espionage group was behind a cybersecurity breach that resulted in the private health records of U.S. Olympic athletes being leaked online this week.Continue Reading…
A new mobile malware known as “CallJam” loves to continuously hit up premium phone numbers from the Android devices it infects.
Just like other Android trojans (such as Android.Xiny.19.origin and the DroidJack remote access tool), CallJam likes to masquerade as downloadable games in the official Google Play Store.Continue Reading…
Snatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out. “First off, this is dead simple and shouldn’t work, but it does,” mubix wrote in a blog post published Tuesday. “Also, there is no possible way that I’m the first one that has identified this, but here it is (trust me, I tested it so many ways to confirm it because I couldn’t believe it was true).”
Google released a bunch of Android patches today, covering off some previously-disclosed issues including the worrying Quadrooter bugs that affected 900 million phones. But another, previously-unknown critical weakness has been covered too and you’ll want to download the patch now because the hack can be delivered hidden inside an innocuous-looking photo in a social media or chat app. A victim wouldn’t even have to click on the evil photo: as soon as its data was parsed by the phone, it’d quietly let a remote hacker take over the device or simply brick it.Continue Reading…