Posts

5 smartphone security fixes to keep your data safe from hackers, scammers and advertisers

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Go anywhere online and it feels like someone is watching. That’s because, well, they are.

Tips to keep your laptop, tablet and smartphone safe while traveling this summer

UP NEXT

UP NEXT

Did you know there’s a secret mobile advertiser ID on your smartphone that knows where you live and what you’ve shopped for online recently? It can easily be traced directly to you and reveals things like your physical address and IP address.



a sign above a store: Public charging stations at places like airports and coffee shops are handy but they also put your data at risk.


© Wittayayut/Getty Images/iStockphoto
Public charging stations at places like airports and coffee shops are handy but they also put your data at risk.

And that’s just one of many trackers, IDs, maps, and settings collecting your info. More often than not, this data is packaged up and sold to the highest bidder. (Sorry, you don’t get a cut.)

Loading...

Load Error

Start the day smarter. Get all the news you need in your inbox each morning.

If you want to get serious about security, you’ll have to go beyond the usual steps.

1. Turn on USB restricted mode

Ever charge your Apple device in a public place, on a plane or at work? You need to turn on USB restricted mode. It helps to prevent hackers from “juice jacking” your device by installing malware or stealing information through the USB charging port.

How to do it: To turn on USB Restricted Mode, select Settings > Face ID & Passcode > type in your passcode. Scroll down to the section called “Allow Access When Locked,” and make sure the option called “USB Accessories” is toggled off.

Public charging stations at places like airports and coffee shops are handy but they also put your data at risk. If you’re going to be out long enough for your device to run out of power, consider getting your own external power bank and juicing it before leaving your home. If you must use a public charging station, think about picking up a USB data blocker that stops malware from entering your device or bring along your own external battery charger.

2. Auto-erase data

Source…

Malware Patrol Data Offered Through Bandura Cyber Threat Intelligence Marketplace | Business


ST. PETERSBURG, Fla.–(BUSINESS WIRE)–Jul 28, 2021–

Malware Patrol, the veteran threat intelligence company, announced today that they now offer data feeds through the Bandura Cyber Intelligence Marketplace.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20210728006051/en/

Cyber security teams around the world rely on Malware Patrol’s timely and accurate intelligence to expand their threat landscape visibility and to improve detection rates and response times. The company offers a variety of feeds related to the most prevalent attack types and vectors, including phishing, malware, ransomware, C2s, DGAs, cryptomining and DNS-over-HTTPS (DoH).

Bandura’s newly launched Cyber Intelligence Marketplace provides customers with access to high-value multi-source cyber intelligence data from leading intelligence providers. Bandura customers can easily discover, access, acquire, deploy, and enforce a curated collection of high-quality cyber intelligence data within minutes across their entire network and edge – in real time – without added latency.

“We’re excited to partner with Bandura Cyber because of their excellent reputation. We greatly appreciate that they are making it easier for their customers to diversify their threat intelligence sources via the Cyber Intelligence Marketplace. Those of us on the intelligence side of things know there’s an endless number of indicators of compromise out there, and that the best security posture comes from using multiple data sources,” said Malware Patrol CEO, Andre Correa.

Learn More

To learn more about the partnership between Bandura Cyber and Malware Patrol, attend a webinar with Bandura CRO Todd Weller and Malware Patrol Marketing & Sales Manager Leslie Dawn on Thursday, July 29 th, at 1 PM Eastern.

About Bandura Cyber

Bandura Cyber is an autonomous cyber intelligence and defense company that brings the power of cyber intelligence and cyber defense to global organizations. Our cloud-based platform combines cyber intelligence, automation, and network enforcement into a single solution that is easy to deploy and manage, filling in the gaps…

Source…

Hackers Target Data at Philadelphia Health-Care Systems

Opt-in to Cyber Safety. Multiple layers of protection for your devices, online privacy and more.


(TNS) — Jefferson Health says a cloud-based database with information on 1,769 patients treated at the Sidney Kimmel Cancer Center was breached in April during a national attack on a software vendor.

Hackers targeted software used for radiation treatment by oncologists.

Elekta Inc. informed Jefferson of the extent of the cyberattack on May 26 and Jefferson reported it to the federal government on Thursday, toward the end of a 60-day legal window for reporting such attacks. Jefferson also last week publicly disclosed the attack for the first time.


The FBI and other federal agencies warned health-care organizations last October that they could be heightened targets for cyber crimes.

Hacking incidents of patient information reported to the U.S. Department of Health and Human Services have soared 153% to 276 incidents so far this year compared with the same period in 2020, according to a federal database. Under federal rules, organizations report hacks only if they involve more than 500 people.

In early June, the database shows, Temple University Hospital reported a hacking incident that affected 16,356 people — without also making any general public announcement.

The health-care system declined on Monday to provide more information. “We are no longer doing business with the third-party vendor that was breached. We’re not able to provide additional details as the investigation is still open,” a spokesman said in an email.

“The bad guys are doing pretty well right now,” said Leeza Garber, a lecturer on cyber crime at the Wharton School and an adjunct professor at Drexel.

“There is a huge trend in hacking and cyber crimes,” said Lisa A. Lori, a lawyer at Klehr Harrison Harvey Branzburg LLP. “It’s not just health care. It’s every industry. Hackers are smart, and people may not be paying attention.”

Hackers look to steal information or to hold for ransom organizations whose computer systems have been crippled. Earlier this year, a cyberattack crippled Colonial Pipeline and disrupted gas supplies on the East Coast. Colonial Pipeline paid the hacking group DarkSide $4.4 million to restore its computer systems. U.S….

Source…

Pa. Convenience Store Must Fork Over Data Breach Report

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


Law360 (July 26, 2021, 8:23 PM EDT) — A Pennsylvania magistrate judge has directed a chain of gas stations and convenience stores to turn over a cybersecurity firm’s forensic analysis of a 2018 data breach to consumers suing over the incident, finding that the report was commissioned to determine the scope of the attack rather than to prepare for litigation.

Rutter’s Inc. had argued that it shouldn’t be forced to disclose an investigative report created by third-party consultant Kroll Cyber Security LLC in response to the data breach because the material was protected by the work product doctrine and attorney-client privilege. The company asserted that BakerHostetler, the outside counsel…

Stay ahead of the curve

In the legal profession, information is the key to success. You have to know what’s happening with clients, competitors, practice areas, and industries. Law360 provides the intelligence you need to remain an expert and beat the competition.

  • Access to case data within articles (numbers, filings, courts, nature of suit, and more.)
  • Access to attached documents such as briefs, petitions, complaints, decisions, motions, etc.
  • Create custom alerts for specific article and case topics and so much more!

TRY LAW360 FREE FOR SEVEN DAYS

Source…