top of page

The Latest Emerging Healthcare Cybersecurity Threat? A Forgotten Function on Your All-In-One Printer

Does anyone even fax anymore? And if they do, aren't they using digital variations like eFax and SmartFax? Or maybe you're still using an all-in-one printer (like my OfficeJet 4650: Print - Fax - Scan - Copy - Web)? If yours is anything like mine, the FAX function is still automatically built in at the factory, and it is this "sweet-spot", your printer's unused fax function, that attackers are targeting. Even with the current IoT boom, printers are often an after thought, if

Hacking Medical Devices? It's not just for Hollywood anymore. How IoT is shaping the medical sector.

Data breaches in the medical sector cost the industry an average of 6 billion dollars per year, and as technology continues to evolve exponentially, the Internet of Things (IoT) will only increase opportunities for potential hackers and data breaches to exploit the sector. As we reported previously, the Orangeworm virus is the first wide-known deliberate attack on medical devices. The entire reasoning behind the launch of Orangeworm is still unknown, however, the virus does g

Use WhatsApp? You Might Need to Check Your Bank Account

"Adidas is offering 2,500 pairs of shoes to celebrate its 69th anniversary" is how the ad reads, but when it sounds too good to be true, it usually is. This phishing scam, which is currently active and targeting mobile users in the United States, Norway, the Netherlands, Nigeria and Sweden, amongst others, with experts predicting attacks on the UK and Ireland to be forthcoming. The attack itself is simple and straight-forward enough: Once the linked is clicked, the website ru

Almost half of government entities report regular cyber attacks. 5 ways you can prepare...

The digital footprints of state and local governments are growing exponentially, leaving the public sector especially vulnerable to cyber attacks and breaches. Between employees using computers to access networks remotely, internet-connected technology such as red-light cameras and CCTVs, mapping and informational systems inside police and other government issued vehicles, and more, organizations must defend and monitor an ever growing number of end points and network infrast

IT Security Professionals Still Using "password" as a Password??

Thought the days of using “password” as your password were long gone? Well, according to Tech Republic’s Alison DeNisco Rayome, at least 10 % of IT leaders STILL use “password” or “qwerty” as their passwords (insert forehead slap emoji here). According to a survey released today, conducted by SailPoint and Vanson Bourne, more than half of IT decision makers surveyed admitted to using the same passwords for both work and personal accounts and 10% claimed they still use simple

Rowhammer Vulnerability Targets Android Smartphone User

Hide your smartphones! A new(ish) attack is now targeting your fifth appendage… Yesterday, a team of Dutch security researchers identified a “GLitch” in Rowhammer (Android users, this applies to you), that allows it to be exploited by using Javascript to hack the device via the phone’s web browser. Originally just a “what if”, the new research shows that repeatedly activating the memory cells can cause the phone’s electrical charges to fluctuate, which can alter the data stor

Orangeworm Continues to Target the Medical Industry

Orangeworm has struck again, this time targeting the computers that operate MRI, X-Ray and other medical devices and machines. These attacks aren’t destructive or malicious however, rather the hackers are accessing the devices in order to learn more about them as part of an ongoing corporate espionage operation. The attack appears to be targeting/gathering information on how these types of machines work, and have also shown interest in "machines used to assist patients in com

SUBSCRIBE TO OUR NEWSLETTER TODAY:

bottom of page