Read These 8 Trending August Blog Posts

That’s a wrap! August comes to a close with another successful month of trending blog posts on IT Security Central. The blog continues its purpose to be an informative community curating leading industry articles on information security. We believe building awareness of insider threats, important changes in the industry, cyber attacks and data breach news is another defensive shield against malicious activity. Read these top trending articles at IT Security Central from August.

Data Breach at UC Health and Healthcare's Ongoing StruggleData Breach at UC Health and Healthcare’s Ongoing Struggle

In Cincinnati, Ohio (USA), the Daniel Drake Center for Post-Acute Care of the UC Health system has reported unauthorized access to patient medical records for the past two years by an employee. The data breach was only discovered in June and has impacted an estimated 4,721 patients. They will have a year of complimentary credit monitoring and identity theft protection services from Experian. [READ MORE]

 

Return of WannaCry? LG Hit by Ransomware AttackReturn of WannaCry? LG Hit by Ransomware Attack

On Wednesday August 16th representatives for LG South Korea have confirmed they were the victim of a cyber attack, which hit them on Monday morning. The spokesperson for LG has stated that it appears to be WannaCry, but there has not been any confirmation as this yet. There was no hesitation on LG’s part on reporting the incident to the proper authorities, the Korea Internet & Security Agency (KISA) in particular. [READ MORE]

 

New and Dangerous Malware Exploit in Microsoft OfficeNew and Dangerous Malware Exploit in Microsoft Office

Just when you thought you were safe, it seems cyber criminals are taking advantage of a vulnerability in Microsoft Powerpoint’s Object Linking Embedding (OLE) interface. Cyber criminals have been using the OLE exploit to install malware on the devices of unsuspecting victims. By using this approach hackers are able to have their malware evade antivirus software. [READ MORE]

 

Cyber Security Predictions for 2018: The Top Experts SpeakCyber Security Predictions for 2018: The Top Experts Speak

Cyber security is an escalating topic that’s receiving a large amount of attention. This is a broad subject. Most commonly, cyber security is mentioned when talking about the latest malware attack, phishing email, social media hack or cloud-based services. As technology improves, new vulnerabilities are discovered and new obstacles challenge security professionals. [READ MORE]

 

New Hotel WiFi MalwareNew Hotel WiFi Malware

Shadow Brokers, the group behind WannaCry, has indirectly transferred the leaked NSA exploit, EternalBlue, to another group of hackers. Fancy Bear or APT28, a notorious group to many cyber security experts across the globe picked up the leaked NSA exploit from a data dump from Shadow Brokers. The public exploit, EternalBlue, caused something of a development rush by hackers to enhance their malware. [READ MORE]

 

HBO Hacked! Game of Thrones Script Leaked with 1.5 TB of Stolen DataHBO Hacked! Game of Thrones Script Leaked with 1.5 TB of Stolen Data

The entertainment industry remains as vulnerable as ever to cyber attacks, as HBO just had an extraordinary 1.5 terabytes of data stolen on Sunday. [READ MORE]

 

 

Future of Cyber Attacks: DNA-Based Malware!Future of Cyber Attacks: DNA-Based Malware!

Could your DNA be used as a vector for attack on devices and networks? The short answer is yes, kind of. As the line blurs everyday between science fiction and reality the incidents of security breaches are becoming more complex and deep. At the Usenix Security Conference, a group of researchers from the University of Washington presented a paper to show how they wrote malware to specifically hijack industry standard gene-sequencing devices. [READ MORE]

 

Common Security Flaws in IoT ProductsCommon Security Flaws in IoT Products

They’re on the rage right now, smart devices that we typically refer to as the internet of things. Everything and anything can now be a smart device including, appliances, homes, medical devices, manufacturing, and even fish tanks. They provide convenience in our lives but now come at a security price. Each and every device in your home is a security vulnerability. [READ MORE]

 

If you’re following the blog and not seeing key information being covered, please reach out to us. We aim to provide the most valuable and informative topics on information security for our readers.

Megan Thudium

Megan Thudium

Megan Thudium is a Berlin-based writer with a passion for curating actionable and enlightening content for business leaders. A seasoned author, her latest works encompass topics in travel, business and information security. Follow Megan on twitter @megan_thudium.

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *