Last week our content manager, Mindy Affrime, sent me an article about the risks associated with Medical IoT Devices. The article caught my attention because of the author. It was published by the Cyber Security Engineering Department at the University of San Diego. The article names four areas they believe “will be particularly vulnerable to cyber attack[s]” in 2017. Read more “Medical IoT Devices Named Top Security Threat”
The Split Tunnel SMTP Exploit allows an attacker to bypass an organization’s email security gateway and inject messages with malicious payloads directly into the victim’s email server. This exploit targets a newly discovered vulnerability in popular Email Encryption appliances as a backdoor. Injectable payloads can include anything that supports MIME encoding including:
- Macro Viruses
- Password Protected ZIP Files
- Phishing Attacks
An update on the WannaCry Ransomware attack. (Source: NY Times) With the clock ticking on whether a global hacking attack would wipe out his data, Bolton Jiang had no intention of paying a 21st-century ransom. Since a week ago, when the malware first struck, Mr. Jiang has been busily fixing and replacing computers at the electronics company where he works in Shanghai. Paying is a bother, he said, and there was no guarantee he would get his data back. Read more “WannaCry Payment Deadline Nears”
The latest on the Bronx Lebanon Hospital cyberattack. (Source: NBC News) Medical records of at least 7,000 patients were compromised in a data breach involving Bronx Lebanon Hospital Center in New York. This hack disclosed patients’ mental health and medical diagnoses, HIV statuses and sexual assault and domestic violence reports, according to records reviewed by NBC News. Other information in the compromised records, which online security experts said spanned 2014 to 2017, Read more “NY Hospital Hacked- 7,000 Patient Records Stolen”
Frost & Sullivan highlights 5 IoT growth areas for 2017
It’s May already, and analysts have begun thinking ahead and considering how the rest of this year is likely to shape up in terms of IoT growth. IoT cybersecurity is on everyone’s mind. The Frost & Sullivan report, European Internet of Things Market Outlook 2017, published this week, predicts that the next evolution in IoT will be ‘sentient tools’ and ‘cognitionor predictive computing.’ Read more “The Internet of Insecure Things”
A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them for sale on the Dark Web for less than $0.01 per record. Last August a Baltimore substance abuse treatment facility had its database hacked. Patient records subsequently found their way onto the Dark Web, according to DataBreaches.net. The group noticed such things as dates of admission, whether the patients are on methadone, their doctors and counselors, and dosing information. Read more “Healthcare Records Sold on Dark Web”
Here are some interesting predictions from TechTarget. Their premise- “If 2016 was the year that the world got to know the internet of things for good and bad, 2017 will be the year that we begin to see benefits of more refined IoT solutions.” Read more “7 IoT Predictions for 2017”
Palikan is a browser hijacker that is bundled with other free software that you download off of the Internet. Once installed it will set the homepage and search engine for any installed browsers to http://www.palikan.com without your permission.
This itself is not considered malicious as there are many legitimate programs that change these settings as well. What is considered malicious, though, is that it will also append the argument http://www.palikan.com to random Windows shortcuts on your desktop and your Windows Start Menu.
Palikan browser hijacker is bundled with other free software that you download off of the Internet. Unfortunately, some free downloads do not adequately disclose that other software will also be installed and you may find that you have installed adware without your knowledge.
When this browser hijacker is installed on a computer, victims easily become frustrated as when they remove the shortcuts from their browser links, they are mysteriously added back. This is because the Palikan.com program utilizes a Windows service that hijacks the shortcuts again when it detects if the shortcuts have been cleaned. This is why we first need to remove the program from the computer before we clean the shortcuts.
How to Remove Palikan From Windows 8/10
1st: Uninstall Palikan
To uninstall a program on Windows 8 or Windows 10, right-click on the Windows Start button and choose “Control Panel” from the pop-up menu.
When the “Control Panel” window opens click on the “Uninstall a program” option under “Programs” category.
When the “Programs and Features” screen is displayed, scroll through the list of currently installed programs and uninstall “Palikan uninstall“. The malicious program may have a different name on your computer. If you cannot find any unwanted programs on your computer, then you can proceed with the next step.
2nd: Reset Your Browser Settings
If you are still experiencing issues with the palikan.com redirect in Chrome, Internet Explorer or Firefox, you will need to reset your browser to its default settings. This step needs to be performed only if your issues have not been solved by the previous steps.
In Google Chrome
Google Chrome has an option that will reset itself to its default settings. Resetting your browser settings will reset the unwanted changes caused by installing other programmes. However, your saved bookmarks and passwords will not be cleared or changed.
Click on Chrome’s main menu button, represented by three horizontal lines. When the drop-down menu appears, select the option labeled Settings.
Chrome’s Settings should now be displayed in a new tab or window, depending on your configuration. Next, scroll to the bottom of the page and click on the Show advanced settings link (as seen in the below example).
Chrome’s advanced Settings should now be displayed. Scroll down until the Reset browser settings section is visible, as shown in the example below. Next, click on the Reset browser settings button.
A confirmation dialog should now be displayed, detailing the components that will be restored to their default state should you continue on with the reset process. To complete the restoration process, click on the Reset button.
In Internet Explorer
You can reset Internet Explorer settings to return them to the state they were in when Internet Explorer was first installed on your PC. Open Internet Explorer, click on the “gear icon” IE Icon Gear in the upper right part of your browser, then click again on Internet Options.
In the “Internet Options” dialog box, click on the “Advanced” tab, then click on the “Reset” button.
In the “Reset Internet Explorer settings” section, select the “Delete personal settings” check box, then click on “Reset” button.
When Internet Explorer has completed its task, click on the “Close” button in the confirmation dialogue box. You will now need to close your browser, and then you can open Internet Explorer again.
If you’re having problems with Firefox, resetting it can help. The reset feature fixes many issues by restoring Firefox to its factory default state while saving your essential information like bookmarks, passwords, web form auto-fill information, browsing history and open tabs. In the upper-right corner of the Firefox window, click the Firefox menu button, then click on the “Help” button.
From the Help menu, choose Troubleshooting Information. If you’re unable to access the Help menu, type about:support in your address bar to bring up the Troubleshooting information page.
Click the “Refresh Firefox” button in the upper-right corner of the “Troubleshooting Information” page.
To continue, click on the “Refresh Firefox” button in the new confirmation window that opens.
Firefox will close itself and will revert to its default settings. When it’s done, a window will list the information that was imported. Click on the “Finish“.
Your old Firefox profile will be placed on your desktop in a folder named “Old Firefox Data“. If the reset didn’t fix your problem you can restore some of the information not saved by copying files to the new profile that was created. If you don’t need this folder any longer, you should delete it as it contains sensitive information.
Your computer should now be free of the Palikan browser hijacker.
IBM’s 2016 X-Force Threats Intelligence Index was just released. The stats are amazing.
Several major data breaches thrust cybersecurity into the global spotlight in 2016. In the Asia-Pacific region, for example, cybercriminals stole 100 GB of government data from the Indian state of Kerala and made off with 300 GB of voter data in the Philippines. These are just two examples of high-profile data breaches that hit in 2016. Leaked records include data such as credit cards, passwords and personal health Read more “IBM dissects 2016 Cyber Attacks”
Lying in a hospital bed, the last thing you should have to worry about is a personal data breach. Yet recent research co-authored by a Michigan State University business scholar found nearly 1,800 occurrences of large data breaches in patient information over a seven-year period.
The study, by Xuefeng “John” Jiang, MSU associate professor of accounting, and colleagues from Johns Hopkins and Ball State universities, is published in JAMA Internal Medicine. The data breaches occurred in health care facilities ranging from UC Davis Medical Center in California to Henry Ford Hospital in Michigan. Read more “Hospitals need Increased Data Protection”
New Mexico is the latest state to enact a statute that requires that their residents be notified when there has been unauthorized access or use of the individuals’ personally identifiable information (PII). With the passage of New Mexico’s statute, Alabama and South Dakota will be the only two remaining states without equivalent laws. The Data Breach Notification Act, House Bill 15, passed New Mexico’s House and Senate on February 15 and March 15, 2017, respectively, without any opposition. Read more “New Mexico- 48th State To Enact Data Breach Notification Law”
JOIN Securolytic’s CEO Sanket Patel at this important and unique TAG CLOUD event on Tuesday March 28th to discuss “The Evolving Security for the Cloud and IoT.” Help us shape the future of the Cloud and IoT Technologies. Read more “The Cloud and IT Security Evolution”
On February 7, 2017 , the team at Securolytics reported on the massive Yahoo breach which affected 500 million of their customers. Yesterday the US Gov’t indicted Dmitry Dokuchaev, Igor Sushchin, Alexsey Belan, and Karim Baratov—for carrying out that Yahoo hack. The indictment unsealed Wednesday by US authorities against two agents of the Russian Federal Security Service, or FSB, (Dmitry Dokuchaev and Igor Sushchin) and two hackers (Alexsey Belan and Karim Baratov) provides some details of how Yahoo was pillaged of user data and its own technology over a period of over two years. Read more “Russians Behind Yahoo Breach”
Securolytics Web Security detects attempted communication by VoluumTrk Mobile Adware. We thought it would be useful to provide a description of how this programs works to illustrate how Securolytics Web Security protects our customers from having potentially problematic programs introduced into their systems. Read more “Securolytics Web Security Detects VoluumTrk Mobile Adware”
Excellent reporting from Modern Healthcare and Health Data Management help us to understand what happened at Emory Healthcare. Here is what you need to know about Emory Healthcare’s breach. Read more “Atlanta Hospital Attacked by Hackers”
Are you satisfied with your IT Security? The experts at Securolytics are working everyday to counter and defeat Healthcare Cybercrime. Is your Healthcare Organization proactive in stopping hackers and cyber criminals? These stats will remind you that the time is now to fight back! Read more “Must-Know Healthcare Cybersecurity Statistics”
Fast Food Chain Arby’s credit card users attacked. Sources at nearly a half-dozen banks and credit unions independently reached out over the past 48 hours to inquire if KrebsOnSecurity heard anything about a data breach at Arby’s fast-food restaurants. Asked about the rumors, Arby’s told that site that it recently re-mediated a breach involving malicious software installed on payment card systems at hundreds of its restaurant locations nationwide. Read more “Atlanta Based Arby’s Acknowledges Data Breach”
The team at Securolytics wants our clients and partners to be informed. Here is the newest report from Yahoo about a breach that affected 500 million Yahoo accounts.
Yahoo‘s newly issued warning to users about malicious hacks is related to a third data breach that the company disclosed in December 2016. Read more “Yahoo sends out new warning on the third data breach!”
The team at Securolytics is excited to present the second of our blog series on IoT Security. Check out the numbers- in 2020 – 20 billion total IoT devices are expected to be in use. Read more “The State of IoT Security Part Two The Threat of DDoS”
This Network World article is a fantastic reminder that our emails are still BIG targets for cybercrime. All organizations must stay vigilant. Proactive Prevention is the Best Defense! www.networkworld.com/
Spam is making a surprising resurgence as a threat to corporate security and becoming a more significant carrier of attacks as varied as spear phishing, ransomware and bots, according to Cisco’s 2017 Annual Cybersecurity Report. Read more “Spam is making a big-time comeback!”
Securolytics is always on the look out for important and current surveys/reports on the state of IT Security. We want our clients and all organizations to be informed. This survey is very telling. If you have an IT Security survey or report you would like to share, please send it to us. We will post it. Read more “25% of Companies Breached in 2016”
In Dark Reading, a look at Flashpoint’s first “Business Risk Intelligence Decision Report.” In 2017, IoT is a major concern for most organizations. Read on Dark Reading.
A new report aims to inform risk management decisions for 2017 by identifying potential security threats and their anticipated effect on businesses. Read more “Flashpoint’s “Business Risk Intelligence Decision Report””
Our congrats to Georgia Tech. Last month, Georgia Tech was granted a $17.3 million cybersecurity research contract by the US Department of Defense. Their mandate- to help establish new science that quickly, objectively and positively identifies the virtual actors responsible for cyberattack. The IT Security experts at Securolytics are so proud that our University is embarking on this all important research. Read more about it here Go Yellow Jackets! Read more “Georgia Tech Lands $17.3-Million Cybersecurity Grant”
Securolytics is working with the Healthcare Industry to proactively defeat CyberCrime. This excellent article looks at the new IoT devices and how they are affecting and providing more opportunity for hackers. Please learn more from our partners
More is not necessarily merrier when it comes to health information technology, as this year’s plague of hacking incidents demonstrates. Read more “Healthcare Under Cyber-Assault!”
Securolytics is working with the Healthcare Industry to proactively defeat CyberCrime. This excellent article looks at the new IoT devices and how they are affecting and providing more opportunity for hackers. Please learn more from our partners at Modern Health below. Read more “Healthcare IoT Is A Christmas Gift to Hackers”
Securolytics is in the forefront of proactively detecting and disarming hackers and identity theft in businesses large and small. Here are some of the major breaches that occurred around the world in 2016 which are important to be aware of. In later articles, we will analyze in depth some of these attacks, so we can ascertain what went wrong and what we can do to prevent them. But first, enjoy our Securolytics infographic! Read more “2016’s Biggest Data Breaches”
Experian’s 2017 prediction report is sobering. At Securolytics, we are in the forefront of proactively protecting Healthcare facilities from cybercriminals. Here is the full report.
REPORT . Read more “Healthcare Top Target for Cyberattacks in 2017”
Securolytics Web Security detects attempted communication by PCKeeper software and related toolbars. We thought it would be useful to provide a description of how PCKeeper works to illustrate how Securolytics Web Security protects our customers from having “Potentially Unwanted Programs” like PCKeeper introduced into their systems. Read more “Securolytics Eliminates PCKeeper Adware”
Securolytics Web Security detects attempted communication by MacKeeper software and related toolbars. We thought it would be useful to provide a description of how MacKeeper works to illustrate how Securolytics Web Security protects our customers from having “Potentially Unwanted Programs” like MacKeeper introduced into their systems. Read more “Securolytics Eliminates MacKeeper Adware”
Last week, Forrester, one of the world’s most influential research and advisory firms, released its “Predictions 2017: Security and Skills Will Temper Growth of IoT” report. “IoT holds the promise to enhance customer relationships and help drive business growth, however, it brings multifaceted complexity”, the report states. Read more “Forrester Predicts Massive IoT Data Breach”
Securolytics Web Security detects attempted communication by the Mindspark family of adware and toolbars. We thought it would be useful to provide a description of how these programs work to illustrate how Securolytics Web Security protects our customers from having potentially problematic programs introduced into their systems. Read more “Securolytics Eliminates Mindspark Adware”
According to the US Department of Homeland Security, “the infections of ransomware, which encrypts critical data and demands payment for its release, are typically triggered by office workers clicking on malicious emails. This prevalence of ransomware is creating significant implications for the business community, with 4,000 ransomware attacks occurring every day, reportedly earning cyber criminals more than $208m in first three months of 2016 alone.” Read more “Ransomware Targeting US Companies”
According to a survey by PricewaterhouseCoopers, almost 70% of connected IoT devices lack fundamental security. According to analyst firm IDC, “the number of IoT devices will grow from approximately 6 billion in this decade to 28 billion in 2020 — a staggering number. The market for wearable smart devices alone is expected to increase at an average rate of 60% per year to $20 billion in 2017.”
In this third installment of Securolytics’ series on IoT device security, we look at a major issue with IoT devices, the software patching process. Or often, the lack thereof. Read more “IoT’s Rough Patch”
The second in Securolytics IoT Security Blog Series
According to a survey by PricewaterhouseCoopers, almost 70% of connected IoT devices lack fundamental security. According to analyst firm IDC, “the number of IoT devices will grow from approximately 6 billion in this decade to 28 billion in 2020 — a staggering number. The market for wearable smart devices alone is expected to increase at an average rate of 60% per year to $20 billion in 2017.” Read more “Is Your Network Safe From IoT Cybercrime?”
The team at Securolytics is excited to present the first of our blog series on IoT Security.
There is no Technology Security issue that has more people talking and businesses struggling for solutions. Why? Simple- IoT is a real security risk for businesses and no one is predicting that the need for IoT security is slowing down soon. There are estimates that there will be in use- 20 billion total IoT devices by 2020. Read more “The State of IoT Security”
In 2015, the healthcare industry was responsible for 66.7% of the 170-million records compromised in the United States through data breaches, according to the Identity Theft Resource Center. Cyber criminals gained access to PHI stored on machines by creating more sophisticated and more frequent network attacks. In our blog posting, ““, we explored in depth how Advanced Persistent Threats (APTs) were used against Excellus BlueCross/ BlueShield to steal information from nearly 10 million people. In this article, we analyze in depth the 10 biggest security breaches in Healthcare that are caused specifically by email. Read more “Healthcare’s Top 10 Email Data Breaches of 2015”
Google has just released a report that in 2015 an estimated 800,000 sites were infected with drive-by download malware and other malicious content. The study specifies that 16,500 websites were newly attacked each and every week which adds up to this whopping total of 800,000 compromised sites. Read more “Google Discovers 800,000 Breached Websites”
The latest count from the Identity Theft Resource Center (ITRC) reports that there have been 227 data breaches recorded through April 5, 2016, and that more than 6.2 million records have been exposed since the beginning of the year. The total number of reported breaches has increased by 50 in the past two weeks. Read more “WSJ reports on 2016 Data Breaches Running 10% Ahead of Last Year”
Cyber attackers have gone back to the basics with the release of a new strain of ransomware malware that locks up compromised devices without encrypting files.
Now they just lock up your business’ devices and hope you pay. Securolytics partner Cyphort Labs discovered the threat- here is what you need to know. Read more “The Newest Malware- Beware!”
We can all attest that the sheer volume of emails we are sending and receiving every day is exploding. Now we have some stats to confirm it. Read more “Email Security- The Human Factor”
Hollywood Presbyterian Hospital is an old and respected medical center deep in the heart of Hollywood. Its stucco buildings and the nurses and doctors within its walls have been healing and caring for Hollywood residents since 1924. On February 5th, they experienced what all Health Care facilities fear. Their technology infrastructure came to a grinding halt. They were victims of a cyber attack. Read more “Hollywood Presbyterian Hospital Paralyzed by Ransomware”
Cloudmark tells quite the story about how spear phishing is disrupting businesses and organizations throughout the US. The Securolytics security systems can monitor these counterattacks and deliver peace of mind. Contact us now.
Here is a sampling of what Cloudmark uncovered. Read more “Inside a Spear Phishing Attack”
Data Loss Prevention (DLP) technologies identify, monitor and protect data in use or in motion on the network, as well as data at rest in storage or on desktops, laptops, and mobile devices. While organisations are more successful at filtering incoming malicious content and deflecting unauthorised entry attempts, they are lagging behind with implementing technical solutions that effectively address data breaches.
Securolytics Data Loss Prevention is a system that is designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in motion (network traffic), and at-rest (data storage). In data leakage incidents, sensitive data disclosed to unauthorised personnel either by malicious intent or by inadvertent mistake. Read more “Data Loss Prevention”
Business owners are becoming more and more aware that their companies are losing productivity when employees shop and social network on company time. To counter this- Web Filtering is becoming a necessity no longer a luxury. It allows for increased productivity with advanced, real-time content filtering and the ability to block access to the websites that drain time and money from businesses large and small. Read more “Inside Securolytics Web Filtering”
Radamant Ransomware distributed via Rig EK- A new ransomware called Radamant has been discovered in early December 2015. On December 31, we found compromised websites redirecting to Rig Exploit Kit and downloading this ransomware. The following sites have been infected: Read more “Cyphort Discovers New Radamant Ransomware”
Inside Advanced Threat Defense
With cybercrime on the rise (127% just this year), and the costs incurred rising with it, we are happy to report that Cryptolocker, a lethal ransom ware can now be stopped. Read more “Securolytics Defeats Cryptolocker Ransomware”
Our latest newsletter illustrates just how powerful the Cloud has become in the global business community. It is no longer a question whether a business should utilize the Cloud, those days are over…
Now we are calculating how much money an organization will save. Teknas is in the forefront of building new Cloud solutions and pushing the boundaries. Our goal is simple — ensure that our clients are safe and secure and prospering every day. Read more “20% Growth with the Cloud”