Wednesday, March 9, 2016

5 ways your WiFi can be hacked


You're probably like most WiFi users, your WiFi is set up, you put a password on your network and don't think twice about it again. This is not the best practice for keeping yourself and your data safe from hackers. Personal WiFi is extremely under-protected. There are many consequences of a WiFi hack, including identity theft! Your WiFi is probably vulnerable, and here is a few ways your WiFi can be hacked.
  1. Many routers, in spite of having multiple security options, are set by default to WEP protection. This method of security sends out patterns through your network that make it easy as pie for anyone to snatch your WiFi password literally out of thin air.
  2. You can set your router to only recognize certain devices (this is called whitelisting or MAC address filtering), but savvy neighbors can detect and mirror that network address with an application called Wireshark.
  3. Your password is too easy. Even with the most advanced connectivity options, free “brute hacking” software can guess your password in a matter of hours by running thousands of varying number and dictionary combinations against the computer database until it guesses the right code. And if you used the default WiFi password that was on your router when you bought it? Yeah…those are totally published on Google.
  4. People are gullible. All it takes is one visitor in your home to click a suspicious link and they’ve opened a virtual back door to your home WiFi.
  5. You’re forgetful. Ever sell an old phone on eBay or ditch an outdated router at a garage sale? If you didn’t do a hard wipe of all the system’s data, you’ve exposed your family’s personal information to random people on the street.
So what’s to be done? Obviously, using a secure password is key, but additional layers of protection will help guard you in case your network does become compromised. Use a free VPN service like Hotspot Shield to secure your data over WiFi connections. This will prevent hackers from accessing personal information like credit cards, birth dates and other data entered into your web browser.






Monday, March 7, 2016

First ever OS X ransomware encrypts your data and asks for money

Ransomware is a particularly nasty piece of malware: After your computer is infected, it encrypts your data and refuses to give you the key unless you pay its makers a sum of money. Save for any glaring mistakes in the malware's implementation, paying up is usually the only feasible way to get your data back, especially if you don't have a backup.

Now, according to security company Palo Alto Networks, the first functional ransomware that operates on Apple's OS X has been discovered.

Dubbed KeRanger, the malware was embedded with version 2.90 of the Transmission software, normally a legitimate BitTorrent app. It waits three days before encrypting certain types of data on an infected system, and then it asks for one bitcoin (around $405) in ransom.

The infected versions of the Transmission installer were detected on March 4, and anyone who downloaded Transmission 2.90 around that date may have infected their OS X machine with the KeRanger malware.

Soon after the infection was discovered, Transmission released a new version of its client, Transmission 2.92, which should be malware-free.

"Everyone running 2.90 on OS X should immediately upgrade to and run 2.92, as they may have downloaded a malware-infected file. This new version will make sure that the “OSX.KeRanger.A” ransomware (more information available here) is correctly removed from your computer," says a message on the official Transmission website.


Tips to get rid of the malware

Palo Alto Networks offers some tips for users who think their system might have been infected. First, in Finder, check for the existence of a "/Applications/Transmission.app/Contents/Resources/ General.rtf" or "/Volumes/Transmission/Transmission.app/Contents/Resources/ General.rtf" file. If the file exists, your Transmission app is infected and you should delete it.

Users should also check, using Activity Monitor, whether there's a process called "kernel_service" running. If it is, users should double check the process, select "Open Files and Ports" and check for a file name like "/Users/<username>/Library/kernel_service". The "kernel_service" process should be terminated with Quit - Force Quit.

Those who find an infection on their computer should check their  ~/Library directory for files named “.kernel_pid”, “.kernel_time”, “.kernel_complete” or “kernel_service.” Those files should also be deleted. 

How did this happen?

As Transmission is a legitimate OS X app, and it requires an Apple-signed certificate to be installed, how could the infection happen in the first place?

According to Palo Alto Networks, two KeRanger-infected Transmission installers were signed with an Apple-issued certificate. It's not clear how the malware-infested installers ended up on Transmission's website — the website could have been hacked, for example, but there's no proof at this point that this is what happened.

The certificate was later revoked by Apple, so trying to start an infected version of Transmission should result in a warning dialog, saying that the app will damage your computer or that it can't be opened.

An Apple spokesperson refused to give any details, besides reiterating that the company revoked the digital certificate that enabled the malware to install on Mac computers.


Similar ransom-demanding malware was previously seen on Windows machines and other operating systems, but not on OS X. In February, hackers demanded millions of dollars in ransom to decrypt the data belonging to a Hollywood hospital, though in the end the hospital got out by paying $17,000. 

Tuesday, March 1, 2016

Beware of spring break scams

Spring break is just around the corner, which means now is the time to prepare your vacation plans. Planning your trip may require making reservations with multiple businesses whether online or over the phone. A travel agency can make the process of booking your spring vacation quick and easy, but using the wrong one could turn your vacation into a nightmare. The Better Business Bureau serving Wisconsin (BBB) is advising consumers to do their research before booking their next vacation.

In 2014, BBB received nearly 8,000 complaints nationally against travel agencies and bureaus. Most complaints alleged consumers felt misled by travel offers that failed to deliver on promises. In some cases, consumers paid money for travel arrangements that were never made.

"Many people are planning to escape the brutal winter and head to warmer climates and spring break is the perfect opportunity,” said Ran Hoth, CEO and president. "When you begin planning your vacation, it could be tempting to accept that too-good-to-be-true offer. BBB recommends doing your research and finding a business you can trust.”

To ensure your trip will be worry free, follow these tips from your BBB:
  • Be alert for travel scams. Unsolicited mail, email and websites offering deeply discounted travel packages could leave you out of a vacation and your money if you’re not careful. Watch out for scams saying that you’ve “won a trip” or too good to be true prices. Generally if you’ve truly won something, it will be given to you as a gift. Be especially leery if an offer is unsolicited.
  • Do your homework. Ask family and friends to recommend a business they’ve used and check with bbb.org to see free Business Reviews. You can also utilize BBB’s Accredited Business directory to find an accredited business.
  • Get everything in writing. Get all the details of your vacation in writing, including travel itineraries, booking confirmations and vouchers. Also review and keep a copy of the business’s cancellation and refund policies.
  • Verify reservations. Get the contact information for the airline, rental car company and hotel. Call prior to departure to confirm all arrangements.
  • Consider travel insurance. Travel insurance is designed to cover such things as trip cancellations or medical emergencies. Certain businesses and policies have different levels of coverage based on what plan you purchase. Ask a lot of questions, and always read the fine print to see what's covered.
  • Pay with a credit card. Paying with a credit card gives you additional protection if something should go wrong with the travel reservation.


Likewise, be wary of the “grandparent scam” which is typically higher this time of year when scammers see the popularity of spring break trips to carry out their scheme. Relatives of travelers, especially seniors, should be skeptical of calls claiming to be from students stranded in distant locations. These scams usually begin with a call from someone claiming to be a person you know (often a child or grandchild) who preys upon the relative by stating they need money to get out of jail or pay for a medical emergency.

If you receive such a call, remember that a request for you to send money by wire transfer or prepaid MoneyPak cards to someone you have not verified is often not legitimate and nearly impossible to reverse. One easy way to confirm a family member’s identity is to ask a simple question such as the name of the family pet or where they attend school.

Original article from Better Business Bureau, view article here.

Snapchat Employee Data Leaks Out Following Phishing Attack


Snapchat is famous for its disappearing messages, but unfortunately not everything in this world is ephemeral when you need it to be. The LA-based company disclosed today that a number of its current and former employees had their identities compromised by a cyber attack this month.

“Last Friday, Snapchat’s payroll department was targeted by an isolated email phishing scam in which a scammer impersonated our Chief Executive Officer and asked for employee payroll information,” Snapchat explained in a blog post. “Unfortunately, the phishing email wasn’t recognized for what it was — a scam — and payroll information about some current and former employees was disclosed externally.”

Snapchat has had hacking problems in the past. The service leaked some 200,000 photos from users back in 2014 when unofficial third party apps were compromised, but on this occasion the circumstances and outcome are different. For one thing, Snapchat said that no user data was affected, while the company is shouldering the blame for the issue. (Last time it said users who lost data were at fault for using unofficial accounts — it then subsequently nixed all third party access to its platform in the name of security.)

So what was accessed this time around? Snapchat isn’t being too specific — this is sensitive — but payroll information could include salary data, social security numbers, bank details, addresses, emails and other personal ID which, in the hands of the wrong people, could create headaches for those affected.

Snapchat said it reported the crime to the FBI, while it sorted through the people affected and is offering them all two years of identity theft insurance and monitoring for free.

Corporate hacking and information theft has occupied the limelight regularly in recent years. The scale of the hack on Sony, which also took place in 2014, was unprecedented and, beyond putting confidential company information (including, ironically, details about Snapchat’s business) into the public forum, it also exposed the personal information and data belonging to thousands upon thousands of Sony staff.


Snapchat said it is “impossibly sorry” for this breach. It vowed to “redouble our already rigorous training programs around privacy and security” in the hope of preventing future incidents like this happening again.


Monday, February 29, 2016

Con artists pose as Microsoft employees in phone calls fishing for personal information

Con artists posing as Microsoft employees are calling people and trying to get them to pay for computer repairs.

A De Soto, Mo. woman was targeted by someone claiming to be from Microsoft. She says the scammer had an elaborate and convincing story about how her computer was used to hack a government website.

The man was offering to fix her computer and her neighbor’s computer for $200.

News 4 covered a similar story in November 2015.

Terrie Weaver of Spanish Lake, Mo. was contacted by someone pretending to be from Microsoft. That person said Microsoft Received information about an error on her computer and wanted to remotely access her computer to fix it.

"I've heard stories how they take control of your computer and I didn't want that to happen,” Weaver said.

The goal of the scammers in these cases is to not only get money, but also access to personal information. A company like Microsoft would never contact people asking to do this kind of work.


The best thing to do is hang up the phone.


View original article by kmov St. Louis here.

Friday, February 26, 2016

Cyberattack total is more than twice previously disclosed: IRS


Cyberattacks on taxpayer accounts affected more people than previously reported, the Internal Revenue Service said Friday.

The IRS statement, originally reported by Dow Jones, revealed tax data for about 700,000 households might have been stolen: Specifically, a government review found potential access to about 390,000 more accounts than previously disclosed.

In August, the IRS said that the number of potential victims stood at more than 334,000 — more than twice the initial estimate of more than 100,000.

"If somebody has all this information … we may see [a] resurgence next year of fraudulent tax returns," Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse, told CNBC in 2015.

The IRS discovered an incident involving its "Get Transcript" application last May, and the Treasury Inspector General for Tax Administration conducted a nine-month investigation. That review turned up the additional accounts that could potentially have been accessed.

Additionally, the IRS said there were 295,000 taxpayer transcripts that were targeted, but "access was not successful."

The agency said it will send mailings to affected taxpayers beginning February 29.


"The IRS is committed to protecting taxpayers on multiple fronts against tax-related identity theft, and these mailings are part of that effort," IRS Commissioner John Koskinen said in a statement. "We appreciate the work of the Treasury Inspector General for Tax Administration to identify these additional taxpayers whose accounts may have been accessed. We are moving quickly to help these taxpayers."


View the original article by Everrett Rosenfeld with NBC here.

Tuesday, February 23, 2016

Stay safe from cybercrime during tax season

Tax season is prime time for online scams. National Cyber Security Alliance has put out a tip sheet on cyber safety during tax time. Make sure to protect your data and check out these tips!

Click on the picture to enlarge.


Tuesday, February 16, 2016

Ransomware takes Hollywood hospital offline, $3.6M demanded by attackers

February 14, 2016 - The computers at Hollywood Presbyterian Medical Center have been down for more than a week as the Southern California hospital works to recover from a Ransomware attack.

According to officials HPMC, they're cooperating fully with the LAPD and FBI, as law enforcement attempts to discover the identity of the attackers.

However, in the meantime the network is offline and staff are struggling to deal with the loss of email and access to some patient data.

The hospital's President and CEO, Allen Stefanek, said the situation was declared an internal emergency, telling NBC LA that the hospital's emergency room systems have been sporadically impacted by the malware.

Some patients were transported to other hospitals due to the incident. In other parts of the hospital, computers essential for various functions, including CT scans, documentation, lab work, and pharmacy needs are offline.

The hospital's network has been down for at least a week, forcing staff to rely on fax machines and telephones to get work done.

Registrations and medical records are being logged on paper and staff have been told to leave their systems offline until told otherwise.

Stefanek said the attack was random, but didn't expand on any of the technical details. Sources who spoke to NBC LA and Fox 11 in LA described the attack with descriptions matching a typical Ransomware infection.

The type of Ransomware responsible for shutting down the hospital remains unknown, but one local computer consultant said the ransom being demanded was about 9,000 BTC, or just over $3.6 million dollars.

Article Credit: Steve Ragan, CSO, Feb 14, 2016 3:43 PM PT
To view original article click here.

Feb 18, 2016
Here is an updated article on the hospital: Hospital Update

Monday, February 15, 2016

Columbia College Becomes STOP. THINK. CONNECT. Partner


Columbia College is proud to announce our partnership with STOP. THINK. CONNECT.


You can view the press release with information about the organization here: Press Release


Tuesday, February 9, 2016

Safer Internet Day

It's Safer Internet Day worldwide, and to celebrate below is a link to some safety tips posted on our Facebook.

Check out our safety tips album on Facebook here.

The history of Safer Internet Day (SID)

SID began as a project to take initiative worldwide for Internet safety. This project was adopted by Insafe in 2005 and is now celebrated in more that 100 countries worldwide each year on the 9th of February.

In the US specifically there has not been much coordination of the day until Spring 2013 when the event gained government support. The event, hosted in the US by iSafe, have many goals of how to raise awareness and create a collaborative environment for information and promotion of active participation in Internet safety.

Make sure you are checking your security knowledge this Safer Internet Day, and help us to keep the Internet safe for everyone! Ways you can start right now:

1. Subscribe to our new blog posts by entering your email in the right hand column. You can stay up to date on the most important and latest security news.

2. Follow the link to our Facebook album above and find tips on how to keep each of your social media profiles safe.

3. On the navigation bar above, select CCIS Policy and update yourself on the college's policy for security.

Happy Safer Internet Day, let's keep our Internet safe!

Friday, February 5, 2016

Free online cyber security courses for beginners


Looking to learn more about cyber security and how you can protect your data at work and at home? Thanks to Andra Zaharia at Heimdal Security, below I have provided the link to her list of 50+ cyber security online courses! At the top of her list, she starts with FREE courses for beginners, then on to more advanced and costly. Make sure you're security aware and take a look at these courses.