How Microsoft spotted another Russian hacking attempt
Microsoft said Monday that it had identified yet another attempt to hack political organizations and that the attack came from what it suspects is a group of professional hackers working for the Russian government. The tech giant spotted and neutralized websites that were attempting to impersonate the sites of conservative think tanks. Read more about the hack attempts by hackers allegedly working for the Russians on CNet.
Melbourne teen hacked into Apple’s secure computer network, court told
A schoolboy has pleaded guilty to hacking into Apple’s servers and accessing 90GB of sensitive files containing user information. The boy who was not named due to legal requirements had repeatedly hacked into the Apple servers according to prosecutors. Apple noticed the breach and had informed FBI about the data theft. Read how a 16-year-old boy was able to hack into Apple servers on The Age.
Health Data Breach Victim Tally for 2018 Soars
After 2016, this is the first time that healthcare data breach victims tally is soaring according to Department of Health and Human Services’ HIPAA Breach Reporting Tool website, commonly called the “wall of shame.” Readers will remember that 2016 was declared the year of healthcare data breach about the massive hack attempts on healthcare firms. The new report shows that 2018 is going to be as bad as 2016 for the healthcare sector as the data breach incidents continue to climb. Read more about the Wall of Shame on Bank info Security.
Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS
Researcher and ex-NSA staffer Patrick Wardle has found out that invisible mouse clicks can allow potential hackers to access root files in Mac OS run PCs. He plans to present his proof of concept at the Defcon 2018. MacOS includes a feature that lets some programs, like AppleScript, generate “synthetic clicks”—mouse clicks that are generated by a program rather than the user. This feature allows disabled people to use Apple PCs and laptops much like the accessibility feature in Windows 10. Wardle found out that he could manipulate this feature by infecting the PC/laptop with a malware. Read more the flaw in Mac OS on The Wired.
The Cybersecurity Regulations Healthcare, Financial Services, and Retail Industries Must Know About
Cyber attacks are often motivated by the desire to steal and sell sensitive data, such as credit card and financial records, personally identifiable information (PII) including social security numbers, or protected health information (PHI). Once obtained, this data can be readily sold on the dark web to be used in fraudulent transactions, or for illegal activities such as credential stuffing attacks. Most companies don’t realize that the data breach is mandatorily regulated through a government agency. Jonathan Nguyen-Duy lists the regulations for health care, financial firms, financial services, and retail industries should know about on CSO Online.