Read These 8 Trending August Blog Posts
That’s a wrap! August comes to a close with another successful month of trending blog posts on IT Security Central. The blog continues its purpose to be an informative community curating leading industry articles on information security. We believe building awareness of insider threats, important changes in the industry, cyber attacks and data breach news is another defensive shield against malicious activity. Read these top trending articles at IT Security Central from August.
In Cincinnati, Ohio (USA), the Daniel Drake Center for Post-Acute Care of the UC Health system has reported unauthorized access to patient medical records for the past two years by an employee. The data breach was only discovered in June and has impacted an estimated 4,721 patients. They will have a year of complimentary credit monitoring and identity theft protection services from Experian. [READ MORE]
On Wednesday August 16th representatives for LG South Korea have confirmed they were the victim of a cyber attack, which hit them on Monday morning. The spokesperson for LG has stated that it appears to be WannaCry, but there has not been any confirmation as this yet. There was no hesitation on LG’s part on reporting the incident to the proper authorities, the Korea Internet & Security Agency (KISA) in particular. [READ MORE]
Just when you thought you were safe, it seems cyber criminals are taking advantage of a vulnerability in Microsoft Powerpoint’s Object Linking Embedding (OLE) interface. Cyber criminals have been using the OLE exploit to install malware on the devices of unsuspecting victims. By using this approach hackers are able to have their malware evade antivirus software. [READ MORE]
Cyber security is an escalating topic that’s receiving a large amount of attention. This is a broad subject. Most commonly, cyber security is mentioned when talking about the latest malware attack, phishing email, social media hack or cloud-based services. As technology improves, new vulnerabilities are discovered and new obstacles challenge security professionals. [READ MORE]
Shadow Brokers, the group behind WannaCry, has indirectly transferred the leaked NSA exploit, EternalBlue, to another group of hackers. Fancy Bear or APT28, a notorious group to many cyber security experts across the globe picked up the leaked NSA exploit from a data dump from Shadow Brokers. The public exploit, EternalBlue, caused something of a development rush by hackers to enhance their malware. [READ MORE]
The entertainment industry remains as vulnerable as ever to cyber attacks, as HBO just had an extraordinary 1.5 terabytes of data stolen on Sunday. [READ MORE]
Could your DNA be used as a vector for attack on devices and networks? The short answer is yes, kind of. As the line blurs everyday between science fiction and reality the incidents of security breaches are becoming more complex and deep. At the Usenix Security Conference, a group of researchers from the University of Washington presented a paper to show how they wrote malware to specifically hijack industry standard gene-sequencing devices. [READ MORE]
They’re on the rage right now, smart devices that we typically refer to as the internet of things. Everything and anything can now be a smart device including, appliances, homes, medical devices, manufacturing, and even fish tanks. They provide convenience in our lives but now come at a security price. Each and every device in your home is a security vulnerability. [READ MORE]
If you’re following the blog and not seeing key information being covered, please reach out to us. We aim to provide the most valuable and informative topics on information security for our readers.