Category Archives: Latest Security News

MilkmanVictory Ransomware Created for Purpose of Attacking Scammers

A hacking group claimed that it developed a new ransomware strain called “MilkanVictory” for the purpose of attacking scammers. Collectively known as “CyberWare,” the group announced their creation on Twitter in mid-May. This is a ransomware i made to send to scammers. MAY I ASK WHY YOU ARE MAKING THINGS ABOUT ANTI-SCAMMER RANSOMWRE — CyberWare […]… Read More

The post MilkmanVictory Ransomware Created for Purpose of Attacking Scammers appeared first on The State of Security.

Scattered Canary Behind Hundreds of Fraudulent Unemployment Claims

Security researchers discovered that the Scattered Canary group had filed hundreds of fraudulent unemployment claims in the wake of COVID-19. According to Agari Cyber Intelligence Division, at least some of the threat actors who took part in a large-scale fraud campaign targeting dozens of states’ unemployment insurance programs belonged to a Nigerian digital crime group […]… Read More

The post Scattered Canary Behind Hundreds of Fraudulent Unemployment Claims appeared first on The State of Security.

Around 9 Million easyJet Customers’ Details Stolen in Hacking Incident

British low-cost airline group easyJet revealed that an hacking incident had exposed approximately nine million customers’ information. On May 19, easyJet issued a “Notice of cyber security incident” in which it revealed that it had fallen victim to a digital attack from a “highly sophisticated source.” An investigation revealed that those responsible for the security […]… Read More

The post Around 9 Million easyJet Customers’ Details Stolen in Hacking Incident appeared first on The State of Security.

UK Power Grid Network Middleman Struck by Digital Attack

A middleman organization in the United Kingdom’s power grid network suffered a digital attack that affected its internal IT systems. Electricity trading arrangements provider Elexon publicly disclosed the attack in a bulletin posted to its website on May 14: We are advising you that today that ELEXON’s internal IT systems have been impacted by a […]… Read More

The post UK Power Grid Network Middleman Struck by Digital Attack appeared first on The State of Security.

The Health Care Technology Trends

Technology is currently evolving with such a fast speed that yearly predictions of trends might appear outdated even before they go live as an article or a published blog post. As the technology advances, it enables even quicker change as well as progress, thus causing a speeding up of the pace of change, until finally, when it will turn out to be exponential.

Staying current with technological trends in healthcare means keeping your eyes open in the future, to recognize the skills that you will have to know as well as what kinds of jobs you need to be competent to do. Below are several technology trends that you are supposed to look at in 2020, and various jobs which will be formed by these trends.

The future of healthcare technology is getting into a new era as lawmakers researchers and innovators, do their utmost to improve the effectiveness, accessibility, and cost of care. Technology, without a doubt, will play a major role in the future of healthcare, but how? The chief information security officer at Greenway states that technology will empower the changeover of healthcare delivery ahead of the point-of-care form to a more effective, efficient approach to whole-patient care.

Artificial Intelligence (AI)

AI or Artificial Intelligence has now received scores of buzz in recent years. However, it goes on to be a trend to look at since its effects on the way we work live, and play is just in the initial stages. Additionally, other AI branches have developed, and this includes Machine Learning, that we will go into here below. Artificial Intelligence is computer systems that are built to copy human intelligence so as to carry out tasks like recognizing images, patterns or, speech as well as decision making. Artificial Intelligence can perform these tasks quicker and also more perfectly than humans

In addition to understanding what the lifestyle of a patient is like, the providers will quickly gain access to information like the current benefits that are given by the insurance providers. This is usually based on the health profile of the patient

Machine Learning

With Machine Learning, the computers are normally programmed to gain knowledge of doing something that they are not programmed to perform: they gain knowledge of discovering patterns as well as insights from data. In most cases, we have two kinds of learning, supervised learning and unsupervised learning.

While the Machine Learning is a division of AI, we as well have subsets in the sphere of Machine Learning, and this includes natural language processing, neural networks, and deep learning. Every one of these subsets presents a chance for focusing on a career field that will just grow.

Edge Computing

previously a technology trend to look at, cloud computing has to turn out to be conventional, with Microsoft Azure,  major players Amazon Web Services (AWS), and Google Cloud leading in the market. The acceptance of cloud computing is continuing to grow, seeing that many and many healthcare systems are migrating to a cloud solution. However, it is now no longer the up-and-coming technology.

As the amount of data that we are dealing with goes on to increase, we have comprehended the weakness of cloud computing in several of the situations. Edge computing is tailored to assist in solving several of those issues as a way of bypassing the latency that is normally caused by cloud computing.

It may exist “on edge,” and if you will, nearer to where computing requires to happen. That is why; edge computing may be used to process data that is time-sensitive in remote places with a low or no connectivity at all to a centralized place.

The function of Health IT is to offer enhanced care for patients and also to help attain health fairness. Health IT encourages recording the patient data so as to improve the healthcare delivery and permit for the study of this data for both the healthcare practitioners as well as the ministry of health or government bodies. The data is used for the accomplishment of policies so to better treat and to avoid the spreading of the diseases.

Quality of healthcare

Health IT typically improves the delivery of the quality of healthcare, increases the safety of the patient, lessens medical errors, and also makes stronger the communication between the healthcare providers and patients. In low and middle-income countries (LMIC), the need for reliable and affordable medical record software is paramount.

The use of Health IT in medical clinics improves the quality of healthcare, which is delivered through offering accurate patient records and also allows doctors to better understand the medical history of the patient. A detailed history of the patient empowers the doctors, thus enabling them to treat ailments more accurately and also avoiding over-prescribing medicines, which can be deadly. With no medical records, the doctors would require to depend on the memory of the patient’s memory, which can lead to the inaccurate medical history of the patient due to poor memory, difficult drug names, and ailments that affect the patient’s memory. Several of this modern technology can also tell the patient if they require going on a diet too and a lot more.

The New technology might still come forward to deliver further Health as well as cost-savings benefits; however, the privacy of the patient is supposed to remain a priority for the providers and technologists. Getting the right associate who will be capable of managing data will happen to be even more dangerous in the future

Additionally, society has a big pool of senior medical as well as healthcare workers, who are informaticians too. These health care workers can mentor and also guide the just like that software. Finally, the communities can share and as well discuss any information they have.

Customers, too, have their right to the privacy of healthcare records. It is their data; thus, they have the right to state who can access their data and the way to use it. With no legislation and regulatory bodies to drive privacy and state how the data can be used, and with what permissions, the data might be sold.

The post The Health Care Technology Trends appeared first on .

U.S. Marshals Announced Data Breach of Prisoners’ Information

The United States Marshals Service announced a data breach involving the personal information of its former and current prisoners. In a data breach notification letter obtained by ZDNet, the U.S. Marshals Service revealed that it had first learned of the security incident in late 2019. On December 30, 2019, the United States Marshals Service (USMS), […]… Read More

The post U.S. Marshals Announced Data Breach of Prisoners’ Information appeared first on The State of Security.

Spike in Snake Ransomware Activity Attributed to New Campaign

Security researchers attributed a spike in Snake ransomware activity to a new campaign that’s targeted organizations worldwide. Snake ransomware first attracted the attention of malware analysts in January 2020 when they observed the crypto-malware family targeting entire corporate networks. Shortly after this discovery, the threat quieted down. It produced few new detected infections in the […]… Read More

The post Spike in Snake Ransomware Activity Attributed to New Campaign appeared first on The State of Security.

Digital Fraudsters Masquerading as FINRA in Phishing Emails

The Financial Industry Regulatory Authority (FINRA) warned that digital fraudsters are impersonating it in an ongoing phishing email campaign. In a regulatory notice published on its website, FINRA revealed that malicious actors had sent out fraudulent emails in which they had impersonated officers at the regulatory authority including Bill Wollman and Josh Drobnyk. All of […]… Read More

The post Digital Fraudsters Masquerading as FINRA in Phishing Emails appeared first on The State of Security.

Increase in Ransomware Demand Amounts Driven by Ryuk, Sodinokibi

The Ryuk and Sodinokibi ransomware families both contributed to an increase in the ransom amounts demanded by attackers over the past quarter. Coveware found that the average ransom amount demanded by ransomware attacks in Q1 2020 was $111,605. This amount was a third higher than what it had been in the final quarter of the […]… Read More

The post Increase in Ransomware Demand Amounts Driven by Ryuk, Sodinokibi appeared first on The State of Security.

Phishers Increasingly Incorporating reCaptcha API into Campaigns

Security researchers observed that digital attackers are increasingly incorporating the reCaptcha API into their phishing campaigns. Barracuda Networks explained that malicious actors are starting to outfit their phishing attempts with reCaptcha walls so that they can shield their landing pages from automated URL analysis tools as well as add a sense of legitimacy to their […]… Read More

The post Phishers Increasingly Incorporating reCaptcha API into Campaigns appeared first on The State of Security.

Is Zoom Safe to Use?

With the majority of the world has been in quarantine and self-isolation for over a month now, by now, we’ve grown accustomed to working from home, and employing technology to communicate virtually with our colleagues and acquaintances, which includes everything from social media platforms, to hanging out on Google.

Having said that, Zoom- the online conferencing call application has skyrocketed in popularity, which is indicated by the fact that daily active users have increased by a staggering 67%. With millions of individuals in lockdown globally, Zoom has emerged as a highly lucrative tool, which also helps maintain a semblance of normalcy, amidst the uncertainty looming over our heads in the form of the COVID-19 pandemic.

By this point, whether you’ve wanted to or not, chances are that you’ve been the part of at least one conference call, class, or even a fitness session on Zoom. Although the online video conferencing application might be nothing short of a godsend if you’re a teacher, or a team manager, as the number of people using Zoom increases, so will the security problems associated with it.

Since Zoom is a fairly new application, most individuals tend to overlook the security loopholes present within the application and continue with their online conferencing business as per usual. The consequences of foregoing security on Zoom, however, can be dire, as is further made evident by the multiple stories circulating about “Zoombombing”, along with several teachers experiencing disruptive behavior, where users broadcast pornographic, hateful, or racist content in between sessions. Moreover, there have been several accounts of private meetings being hijacked by the presence of an intruder.

Responding to the massive number of complaints, Zoom did update its blog detailing some tips and tricks that might prove to be useful in fostering protection on Zoom, there is still a lot of vagueness surrounding safety on Zoom. Zoomboming aside, a recent report revealed that Zoom’s data is being routed through Chinese web hosting servers.

Shockingly, the parliament of the United Kingdom has been using Zoom for sensitive meetings. A follow up study by HostingData.co.uk, a web hosting reviews website based in London, found that even if parliament used other video conferencing applications, much of the call data would be routed through international data centers.

In an attempt to aid our readers, and to clear most of the doubts that they might be harboring, we’ve compiled an article that dives deep into the safety aspect of the popular online conference calling application, along with some tips to boost security.

Do You Really Need to Worry About Your Privacy While Using Zoom?

A popular question that many individuals have been asking, is whether concerns over Zoom’s privacy policy are legitimate or not. After all, in the midst of the coronavirus pandemic, it’s safe to say that most of us have already got a lot to worry about, without having to stress over our private online meetings being sabotaged by an intruder.

Despite not wanting to pay heed to any other worries other than the coronavirus right now, we believe that staying informed about the threats present on Zoom is highly critical to ensuring cybersecurity in the long run. Moreover, staying in the know-how of the vulnerabilities present on Zoom can also help prevent you from being the victim of a cybercrime, which is almost certain to add to your worries.

With that out of the way, Zoom, unfortunately, just like every other web-based platform, does consist of multiple entry points through which hackers and other cybercriminals can gain entry into a confidential online conference call. The greatest risk to users’ privacy is the fact that Zoom collects information, and permits other third-parties to collect data on their users as well.

Bearing a striking resemblance to Facebook, Zoom’s privacy policy (which most of us don’t even bother to read) contains a clause that includes the right to collect it’s users’ data, store it on any popular cloud storage provider, and to share it with third-parties. Typically, these third-parties consist of advertisers, who now, through Zoom have access to your information. It is also worth mentioning that Zoom’s right to collect data isn’t just limited to users name, location, and usage information,  but also the content shared in the online calls as well,  such as instant messages, files, whiteboards, etc.

Bearing witness to the vulnerable nature of Zoom’s privacy policy is the discovery of a software vulnerability that left millions of users’ videos exposed. Fortunately enough, Zoom was extremely robust in its effort to remedy the discovered vulnerability, and the issue has since been resolved.

Although the video vulnerability has been fixed, the tool that was used to identify the vulnerability can potentially allow anyone to manipulate a meeting code and gain entry into a confidential meeting. Along with the tool allowing access to a Zoom meeting, it has also been brought into light that malicious agents can rely on software to guess meeting ID numbers. Cybersecurity specialists have already devised a software program, called zWarDial, which can predict Zoom meeting IDs between nine and eleven digits.

Although zWarDial can only identify meeting IDs correctly, with an accuracy of about 14%, these statistics still lead to 100 meetings being compromised in the course of an hour. Once the program finds an activity meeting, it can then go on to discover the meeting link, date, and time, along with other crucial details such as the meeting organizer and the meeting topic.

How Can You Stay Safe on Zoom?

Up till this point, we might have drilled an image of Zoom as the harbinger of destruction to the already cybersecurity infrastructures that we’ve put up. Although that statement might be a tad bit (read: heavily) exaggerated, there’s a huge silver lining to look forward to.

Once you start taking security seriously and follow some steps, whether you’re hosting a Zoom meeting or attending one, you can navigate and make the most out of the popular online conferencing application

Safety Measures to Take as a Host

  • Always be extremely cautious of the people that you’re sharing your public meeting link with. Try not to upload it on social platforms, which might result in untrustworthy individuals gaining access.
  • As a precautionary step, you can also set up a password for participants to validate their entry into the meeting.
  • Whilst screen sharing, make sure that you’re the only person in control by ensuring that “Host” is the only option selected from the “Who Can Share?” menu.
  • Set two-factor authentication, and remove any unwanted participants from the meeting.
  • Last, but certainly not least, if you encounter Zoombombing or any suspicious activity in your meeting, report it directly to Zoom.

Safety Measures to Take as a Meeting Attendee

  • To ensure that your data isn’t being shared with untrusted parties, ask whether your host is recording the call. You can also determine this by seeing if there’s a small red dot on the screen.
  • Ask your host as to their reasons for recording the call, and where your information is being stored. To ensure maximum security, recorded content should be stored on a secure server.
  • If you wish to protect your room’s privacy, try using a virtual background to prevent sharing unnecessary information about your personal space, such as the posters you’ve put up in your room, etc.
  • Ensure that your camera and microphone are turned off when you aren’t talking, so as to prevent unwanted attention to your actions and responses.

Parting Words

Amidst the COVID-19 pandemic, with a monumental number of people locked up in their homes looking for answers, the Zoom application has now become a staple tool for many. Not only does it allow us to socially distance while being social, but it also helps maintain some sense of normal life.

 

Having said that, however, users can significantly amp up on their security on the online conferencing application, simply by adhering to the safety steps that we’ve mentioned above!

The post Is Zoom Safe to Use? appeared first on .