Why hackers want kids’ personal information

Data breaches give hackers a chance to cash in, and no personal information is more valuable to cyber criminals than a child’s.

It’s a surprising fact in the age of the massive cyberattack. While adults might fret when their financial data is stolen in a breach, it’s their kids’ identities they should be worried about, experts say….

READ MORE

Your High Tech Surgery Can Be Hacked

Like safety testers who crash cars with the goal of improving their safety, engineers have hacked a next-generation teleoperated surgical robot.

The researchers hacked the robot—one used only for research purposes—to test how easily a malicious attack could hijack remotely controlled operations in the future and to make those systems more secure.

Real-world teleoperated robots, which are controlled by a human who may….

READ MORE

Attack Gains Foothold Against East Asian Government Through “Auto Start”

East Asian government agencies came under siege when attackers targeted several servers within their networks. The said attackers, who showed familiarity and in-depth knowledge of their agencies’ network topology, tools, and software, were able to gain access to their targeted servers and install malware. After which, they used the compromised servers not only as gateways to the rest of the network but also as C&C servers. This particular attack has been active since 2014.

The attackers tried to maintain their presence in the network by modifying applications installed in the servers. Certain files in the said applications—mostly productivity, security, and system utility apps—were tampered to load malicious DLL files. The common denominator among these tampered apps is….

READ MORE

VIDEO: How this woman tracked down her identity thief

When Jessamyn Lovell’s wallet went missing at an art gallery in 2009, she took all the right precautions. She canceled all of her credit cards and put a fraud alert on her credit report to prevent anyone taking out new lines of credit under her name.

Despite these efforts, a year and a half later, Lovell, 38, received a phone call from a police officer who had strange news: A woman in San Francisco had been arrested for using Lovell’s driver’s license to check into a swanky hotel. Lovell recently recounted her story on NPR’s This American Life. She had gotten a new license but….

READ MORE

How Can I Protect Myself from Identity Theft Online?

Eight key steps to preventing identity theft online:

1. Protect your computer and smartphone with strong, up-to-date security software. If your computer or phone is infected with malicious software, other safeguards are of little help because you’ve given the criminals the key to all your online actions. Also be sure that any operating system updates are installed.

2. Learn to spot spam and scams. Though some phishing scams….

READ MORE

Data Of 1.1 Million Carefirst Users Stolen In Cyberattack

CareFirst BlueCross BlueShield, a non-profit healthcare company, said Wednesday that the data of about 1.1 million current and former customers had been comprised in a cyberattack.

“Evidence suggests that attackers could have potentially acquired member user names created by individuals to use CareFirst’s website, names, birth dates, email addresses and subscriber identification numbers,” the company said, in a statement on its website. The company also said it blocked member access to those accounts, and would offer two years of free credit monitoring and identity theft protection to those affected.

The attack comes after a spate of similar cyber security breaches at large companies in the United States….

READ MORE

25 tips to both prevent and manage a cyber attack

Cyber attacks and data breaches have become a daily threat to both individuals and businesses. The different types of cyber risks are seemingly limitless and it’s all but impossible to predict exactly how and when you or your business may become a target for cyber criminals.

Adding to the uncertainty is the reality that cyber threats are often difficult to identify and comprehend. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified….

READ MORE