Appalachian Regional Healthcare (ARH), which operates two hospitals in West Virginia and nine in Kentucky reported over the weekend that it was the target of a cyberattack that forced staff to revert to paper. No email, no electronic health records, no other electronic systems. Just paper. The hospitals are assessing whether to transfer critically ill […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Mailguard is reporting a new phishing scam that uses the old “here is an invoice for you to review” or “here is a purchase order for you to review”. A screenshot of one of the emails is shown below. In both cases, the malware takes advantage of a vulnerability in Word that has been patched, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It seems like there are a lot more breakins than there are convictions in court, but every now and then the feds catch a big one. In this case it is Roman Seleznev, the son of a Russian lawmaker. He was accused of costing banks about $170 million in losses and costs to repair the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When is a hack not a hack? When an Israeli company sells it as a feature. The company, NSO Group, sells the software, to governments among others. The software allows the attacker to: Control the camera Listen to the microphone Track the phone’s location Intercept text messages Intercept emails Download the calendar data Download your […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It seems like I write one of these every day. Today it is Millennium Hotels and Resorts, an international hotel chain based in Colorado. They are saying customers that used their credit cards at 14 of their hotels between early March and the end of June need to keep an eye on their credit card […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A few years ago, computer researchers discovered a problem with the VW keyless ignition system. VW sued the researchers rather than fixing the problem and delayed the release of the information about the vulnerability for two years. In VW’s defense, maybe it was difficult to close the vulnerability and it certainly would take time. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]