The U.S. Secret Service is warning banks and ATM owners about a new technological advance in cash machine skimming known as “periscope skimming,” which involves a specialized skimming probe that connects directly to the ATM’s internal circuit board to steal card data.Continue Reading…
After the iPhone encryption battle between Apple and the FBI, Apple was inspired to work toward making an unhackable future iPhones by implementing stronger security measures even the company can’t hack.
Even at that point the company hired one of the key developers of Signal — one of the world’s most secure, encrypted messaging apps — its core security team to achieve this goal.
But it seems like Apple has taken something of a backward step.
Earlier this week it was revealed that hackers managed to steal the private data from some 500 million Yahoo accounts.
The tech giant, now under pressure to explain how the 2014 cyberattack occurred and why it has only just come to light, has said the attack could have been state-sponsored.
An exponential rise in malware means employees are at their highest-ever risk of accidentally installing malicious software onto an enterprise network — an event that happens every four seconds within the average company, a new report has warned.
Security researchers at Check Point analyzed information on over 30,000 security incidents discovered by the company’s ThreatCloud prevention software at more than 1,000 companies across the globe.
Subscribers of UK-based MoDaCo, a forum specialising in smartphone news and reviews, have been unpleasantly surprised by notifications that the site and their account have been compromised.
But not all subscribers have been notified, and that’s because the alert didn’t come from the site admins, but from the Have I Been Pwnd? service. The service allows users to submit their email address and notifies them when it’s found in data batches stolen in breaches.Continue Reading…
A box containing confidential client health information disappeared from an office at KidsPeace’s Schnecksville facility, but the agency says it believes the records were not “inappropriately” removed or accessed.
It won’t surprise anyone who follows data security to know that this past summer saw a hack of databases containing Louisiana driver information. A hacker going by the ironic handle “NSA” offered the data for sale on a “dark web” marketplace.
University Gastroenterology and its 19 offices were victims of a data hacking scam, where an individual gained access to the network, copied information for 14,000 patients and then encrypted it, NBC reports.
Here’s what you need to know.
1. Patient names, addresses, dates of birth, Social Security numbers and medical billing information were all taken by a hacker. The data was then encrypted and returned. The hacker is asking for a cash sum to unencrypted the data.
2. UGI notified the affected patients through a letter.
3. There is no evidence the data has been misused.
4. The person had gained access to patient files from a practice UGI acquired in 2014.
5. UGI has made security enhancements to ensure their systems are safe.
6. The center has also established a call center to answer patients questions and concerns about the hack at 844-575-7459. The center is also offering credit monitoring protection through Equifax to the impacted patients.
Find the Original Article Here
The data breach has exposed plaintext passwords, usernames, email addresses, and a large trove of other personal information of more than 6.6 Million ClixSense users.
ClixSense, a website that claims to pay users for viewing advertisements and completing online surveys, is the latest victim to join the list of “Mega-Breaches” revealed in recent months, including LinkedIn,MySpace, VK.com, Tumblr, and Dropbox.
Hackers are Selling Plaintext Passwords and Complete Website Source Code
More than 2.2 Million people have already had their personal and sensitive data posted to PasteBin over the weekend. The hackers who dumped the data has put another 4.4 Million accounts up for sale.
In addition to un-hashed passwords and email addresses, the dump database includes first and last names, dates of birth, sex, home addresses, IP addresses, payment histories, and other banking details of Millions of users.
Troy Hunt, operator of Have I Been Pwned? breach notification service, verified the authenticity of the data taken from ClixSense.
Besides giving away 4.4 Million accounts to the highest bidder, the hackers are also offering social security numbers of compromised users, along with the complete source code of the ClixSense website and “70,000 emails” from the company’s internal email server, according to a Pastebin message advertising the stolen database.
PasteBin has since removed the post as well as the sample of the compromised database that contained user account information.
Here’s How Hackers Hacked ClixSence:
ClixSense admitted the data breach and said some unknown hackers were able to get access to its main database through an old server which the firm was no longer using, but at the time, still networked to its main database server.
After gaining access, the hacker was able “to copy most, if not all” of the ClixSense users table, ran SQL code to change account names to “hacked account,” deleted several forum posts, as well as set account balances of users to $0.00.
While talking to Ars Technica, ClixSense owner Jim Grago admitted that the database contained entries for roughly 6.6 Million accounts and that the company became aware of the breach on September 4 and managed to regain control of their DNS over the weekend.
“This all started last Sunday, September 4th about 5 am EST when my lead developer called me and said ClixSense was redirecting to a gay porn site. The hackers were able to take over our DNS and setup the redirection,” Grago wrote.
“On Monday (Labor day) they were able to hack into our hosting provider and turned off all of our servers, hacked into our Microsoft Exchange server and changed the passwords on all of our email accounts. On Tuesday they were able to gain access to a server that was directly connected to our database server and get a copy of our users table.”
Change Your Passwords and Security Questions Now
Users are strongly advised to change their passwords for ClixSence account immediately, and it would also be a good idea to reset passwords for all of your other online services, especially those using the same passwords.
Since ClixSense uses a large trove of personal information on its users, make sure you change your security questions, if it uses any of the information you provided to ClixSense, such as your address, date of birth, or other identifying information.
Moreover, I recommend you to use a good password manager to create strong and complex passwords for your different online accounts, and it will remember all of them on your behalf.
I have listed some of the best password managers that could help you understand the importance of password manager and choose one according to your requirement.