“Worker falls for email phishing scam”

On Feb. 28, 2016, the Snapchat team released an apology to its employees explaining that recently, one of its employees fell for a phishing scam and revealed some of its employees payroll information. Although company servers were not breeched, a number of employees have now had their identity compromised. The Snapchat team explained that the attack occurred last Friday, the payroll department was targeted by a scammer who impersonated Snapchat Chief Executive Officer who in the email phishing scam requested employee payroll information. Because the phishing email scam was not properly recognized as a scam, the requested payroll information was disclosed. The attack has been reported to the FBI. For the full story, click here

“American Dental Association Inadvertently Mailed Malware-laced USB Drives”

The American Dental Association announced that a percentage of flash drives included with the 2016 CDT manual were found to have malware. The 2016 CDT manual included a credit card-sized USB storage device in the back pocket that contains an electronic copy of the book. The discovery was made in early March of 2016, and the American Dental Association already took steps to notify customers, re-sellers, and distributors of the problem discovered. The distribution of the 2016 CDT manual began in late 2015, and although an anti-virus should detect the malware if present, the American Dental Association is still advising dentists who have not used their 2016 CDT flash drive to throw it away. Instead, customers were given a link to an electronic version of the 2016 CDT manual to use as an alternative.  For the full article, click here

“Attackers Wrapping New Tools in Old Malware to Target Medical Devices”

A new report from TrapX Security, a global leader in deception-based cyber security, warned this week that malware attackers are now targeting medical devices running outdated operating systems like Windows XP and Windows 7. These outdated systems give attackers safe harbors within hospital networks for carrying out data theft in a nearly undetectable manner. TrapX released a report named “Anatomy of an Attack-Medical Device Hijack 2”, in which it explains how attackers have evolved and by camouflaging old malware with new techniques, attackers are able to successfully bypass traditional security mechanisms to gain entry into healthcare networks to access sensitive data. For the full article, click here

“Apple Users Data Held for Ransom”

An Apple iPhone is pictured next to the logo of Apple in Bordeaux, southwestern France, February 26, 2016. REUTERS/Regis Duvignau

An Apple iPhone is pictured next to the logo of Apple in Bordeaux, southwestern France, February 26, 2016. REUTERS/Regis Duvignau

Palo Alto Networks Inc. a cyber-security company told Reuters Sunday that “Apple Inc (AAPL.O) customers were targeted by hackers over the weekend in the first campaign against Macintosh computers”. This was done using ransom-ware, a type of virus that encrypts the data on the infected machine and can only be unencrypted using the correct encryption key which is provided to the user once they pay the ransom. This was downloaded along with version 2.9 of Transmission a data transfer application used on peer to peer networks and Transmission users are urged to upgrade to version 2.92. For the full article, click here