• img February 20, 2018

What types of hospitals experience data breaches?

An estimated 16 million patient records were stolen in the United States in 2016, and last summer the British health system was crippled by a ransomware attack. While we know these events are on the rise, what do we know about the hospitals that are vulnerable to these attacks? A study in The American Journal […]

Read More
  • img February 20, 2018

Money Laundering Via Author Impersonation on Amazon?

Patrick Reames had no idea why Amazon.com sent him a 1099 form saying he’d made almost $24,000 selling books via Createspace, the company’s on-demand publishing arm. That is, until he searched the site for his name and discovered someone has been using it to peddle a $555 book that’s full of nothing but gibberish. The […]

Read More
  • img February 19, 2018

US sets up dedicated office for energy infrastructure cybersecurity

The US government is setting up a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the US Department of Energy. The CESER office will focus on energy infrastructure security and enable more coordinated preparedness and response to natural and man-made threats. “$96 million in funding for the office was included in President […]

Read More
  • img February 19, 2018

Russian, Indian banks lose millions to hackers

The Russian central bank’s Financial Sector Computer Emergency Response Team (FinCERT) disclosed on Friday that hackers compromised a computer at a Russian bank and used the SWIFT system to transfer 339.5 million roubles (around $6 million) to accounts they controlled. No details about the heist have been shared, so we don’t know which bank has […]

Read More
  • img February 19, 2018

IRS Scam Leverages Hacked Tax Preparers, Client Bank Accounts

Identity thieves who specialize in tax refund fraud have been busy of late hacking online accounts at multiple tax preparation firms, using them to file phony refund requests. Once the Internal Revenue Service processes the return and deposits money into bank accounts of the hacked firms’ clients, the crooks contact those clients posing as a […]

Read More