What You Need To Know About The Coronavirus

What You Need To Know About The Coronavirus

In December news about a new SARs like virus started to hit the news. A dangerous and potentially infectious virus appeared in Wuhan, China. Named 2019-nCoV, the virus comes from the coronavirus family. It was first identified back in the 1960s. With the rise of infections it’s important to obtain creditable information from trusted sources. The WHO declared a Global Health Emergency and many organizations have followed suit. The Ontario government has setup a site with information on the new 2019 virus. For more information please click on the link below and learn how to protect yourself in upcoming months.

https://www.ontario.ca/page/2019-novel-coronavirus-2019-ncov

 

 

Ransomware is now a $2 billion-per-year criminal industry

Ransomware is now a $2 billion-per-year criminal industry

Ransomware payments in 2017 will hit a record $2 billion, according to a new research from the cybersecurity firm Bitdefender.

That figure would make 2017 the most costly year ever for ransomware, doubling the $1 billion paid out by ransomware victims in 2016 and skyrocketing above the $24 million paid in 2015. The upward trend will likely continue into 2018 as malware becomes more sophisticated and difficult to stop.

Read more at https://www.cyberscoop.com/ransomware-2-billion-bitdefender-gpu-encryption/

#IoT #DDoS loophole? Do You Still Trust The Internet?

#IoT #DDoS loophole? Do You Still Trust The Internet?

Cyber-warfare – Yesterday a massive DDoS attack took down a large portion of the Internet leaving sites offline or at dial-up speed. At first it was thought that the issue was neutralized, however as midday approached another massive attack rendered major sites unavailable. The attack was targeted at a major domain DNS server provider, however the ramifications to the attack were seen to be much more substantial. Sites like Twitter, Netflix, Reddit, PayPal, Kijiji, Pinterest and even the entire PlayStation Network were down or struggling. This was only a small portion of the list. At the moment we still do not know who initiated the attack, however it’s thought that IoT (Internet of Things) devices may actually be the an accessory to the crime. With so many providers affected we now need to take time analyze how this may affect online EMR providers in the future. Can IoT malware attacks and other types render cloud based applications offline? How does this affect patient care?

To read more about the attack that shutdown a large portion of the Internet click on the links below:

https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/

https://threatpost.com/mirai-fueled-iot-botnet-behind-ddos-attacks-on-dns-providers/121475/

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

Ransomware has seriously turned on to a noxious game of Hackers to get paid effortlessly.

Once again the heat was felt by the Los Angeles-based Presbyterian Medical Center when a group of hackers had sealed all its sensitive files and demanded $17,000 USD to regain the access to those compromised data.

The devastation of the compromised files can be pitched as:

  • Compromised emails
  • Lockout Electronic Medical Record System [EMR]
  • Encrypted patient data
  • Unable to carry CT Scans of the admitted patients
  • Ferried risky patients to nearby hospitals

As the situation was grown out of wild, the hospital paid 40 Bitcoins (Roughly US $17,000) to the Ransomware Criminals to resume their medical operations after gaining the decryption keys.

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” the hospital CEO Allen Stefanek said in a letter.

All the electronic medical system were restored back soon after unlocking the encrypted file locks.

The Ransomware had stolen the nights of many network administrators, as they would be often blamed to fight up this nasty threat; instead of blaming staffs who click the illegit links in their e-mail.

http://thehackernews.com/2016/02/ransomware-medical-record.html?utm_source=THNLS&utm_medium=BelowLS&utm_campaign=LS

http://hollywoodpresbyterian.com/default/assets/File/20160217%20Memo%20from%20the%20CEO%20v2.pdf

Using No-IP for your #EMR? Be careful!

Using No-IP for your #EMR? Be careful!

Microsoft Appoints Itself Sheriff of the Internet

“Microsoft contends it seized domains to stop distribution of two widely used malware tools

It was 7 o’clock in the morning when the knocking on Dan Durrer’s front door woke him up. His dog started barking, and Durrer thought he was getting an early morning package. But when he opened the door, he wasn’t greeted by the FedEx man. He was face-to-face with a process server, a messenger from the courts, who handed him a stack of legal documents—three inches thick. Somewhere in that stack—buried in all the legalese—was the news that Microsoft had taken control of his company, but Durrer didn’t have time to read it. Almost immediately, his pager lit up with messages saying the company’s internet services had stopped working.

For the past 15 years, Durrer has worked as the CEO of a small internet service provider called No-IP. Based on Reno, Nevada, the 16-person company offers a special kind of Domain Name System service, or DNS, for consumers and small businesses, letting them reliably connect to computers whose IP addresses happen to change from time to time. It’s used by geeks obsessed with online security, fretful parents monitoring nanny cams in their toddler’s bedrooms, and retailers who want remote access to their cash registers. But it’s also used by criminals as a way of maintaining malicious networks of hacked computers across the internet, even if the cops try to bring them down.

Read more.

Other articles:

Four million domains have been shutdown, despite the fact that Microsoft only wants 18,472 of them