Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Hackers Targeted Sacred Heart Health System PDF Print E-mail
Written by Administrator   
Saturday, 28 March 2015 18:00


Florida, USA situated Sacred Heart Health System of late declared that hackers managed to acquire admission into a PC belonging to an intermediate billing vendor so they could reach the secret information of about 14,000 patients, published ricksblog.biz dated March 17, 2015.

Actually, hackers through a phishing assault acquired admission into a staff member's e-mail account who worked at the billing company.

It maybe noted that phishing assaults involve fraudulent e-mails, which seem as coming from one genuine person or company, as they contain baits for the e-mail recipients to act by following a given web-link that takes onto some phony website or downloading malware onto their computers from attachments in such e-mails so their e-mail accounts can be compromised.

Now, as a consequence of the latest phishing assault, the health data of some patients at Sacred Heart got compromised that consisted of name of patients, their birth dates, the service date, physician name, diagnosis along with treatment processes, and total expenses.

And while the Social Security Numbers of about 40 persons too got accessed, the hackers, however, couldn't manage in reaching medical records of patients.

Also, when on 2nd February 2015, Sacred Heart got notification about the security breach; the organization and the billing company together instantly started one detail investigation.

Privacy Officer Genevieve Harper at Sacred Heart Health System stated that the organization greatly valued patient data's safety and privacy so it regretted the disturbing incident. According to him, it was on top of their activity list to help all of the affected patients, thus published ricksblog.biz.

Harper further said that all essential as also suitable measures were being taken for stopping the kind of happening ever again. In particular, the health system was coordinating with its billing company for making sure the latter continuously changed and evaluated its efforts towards improving the privacy/safety of sensitive/confidential data within its possession.

Those impacted with the breach have been suggested to call 877-244-8984 from 8 am-6 pm, any day from Monday-Friday incase they've any queries. There's also free service to get credit reports for anxious individuals, from TransUnion, Experian alternatively Equifax.

Read more... - Hackers Targeted Sac...
 
NCUA Cautions Consumers about Phishing Scam PDF Print E-mail
Written by Administrator   
Saturday, 28 March 2015 18:00


National Credit Union Administration has expressed concern that end-users could get victimized with one fresh phishing campaign, which masquerades as the regulator by copying its name and online site, published cujournal.com dated March 17, 2015.

It maybe noted that the Virginia, USA headquartered NCUA works like one independent federal organization that US Congress has created for controlling the credit unions of federal rank.

Lately NCUA stated that many reports had come to it regarding a phishing campaign which resorted to one website having the logo and design exactly like its own so as for defrauding end-users into transferring money or revealing information.

The fraudulent e-mails are spoofed to look like NCUA messages that seem as emerging in Australia, however, state the agency provides services within Europe, USA and other countries. According to NCUA, consumers are being cautioned that the e-mails and the administration aren't in any manner linked. Specifically, the phishing e-mails that try convincing end-users towards giving their login information, account numbers, and Social Security Numbers (SSN) aren't from NCUA.

It (the administration) has advised everyone who gets the above phishing e-mails for contacting the fraud hotline phone-number of NCUA while inform IC3 (Internet Crime Complaint Center) an alliance joining National White Collar Crime Center to FBI.

Worryingly, the above type of phishing attacks is numerous that pose one huge threat to Internauts, remark security analysts.

According to them, following are certain easy suggestions for aborting phishing attacks. First, hackers commonly use an urgency tactic to make victims reveal personal information regarding any kind of account like bank account, credit or debit card account, password for an account or SSN similar to the above instance. This tactic is to get the victim follow a malevolent web-address else open an attachment designed for contaminating his PC else capturing his secret data. Hence, it's suggested that such web-links/attachments mustn't be clicked/viewed.

Secondly, all legitimate brands, companies or agencies wouldn't ever contact customers through e-mail, like within the aforementioned instance. Actually, NCUA too states that it won't ever communicate with members asking for financial or other personal information, while if it does, that would be through postal mail.

Read more... - NCUA Cautions Consum...
 
Aurora Health Care Cautions about Internet-based Assaults Targeting the Organization PDF Print E-mail
Written by Administrator   
Friday, 27 March 2015 08:00

Wisconsin, USA-situated biggest health system in the state Aurora Health Care recently cautioned its employees regarding cyber-assault that had targeted the organization for stealing logon credentials that visitors might enter into various websites particularly financial sites, published jsonline.com dated March 17, 2015.

Aurora stated that there was no clue regarding if any patient data like insurance information or medical records had got stolen.

It also told a few erstwhile and all current employees that malware had infected servers and workstations that the health system used so miscreants could seize logon details whilst nurses, doctors as well as other staff visited particular social networking and financial websites.

The malware, allegedly one PC-virus that had infected Aurora Health came to the experts' notice on January 27, 2015 following which Aurora contacted FBI (Federal Bureau of Investigation). The health system further engaged one cyber-security agency for eliminating the virus as well as for carrying out one forensics analysis for finding out the various data that may've got seized.

Through one memo dated March 10 that Aurora distributed among employees, the organization said that surely such kinds of criminal operations were damaging, expensive as well as frustrating. Aurora kept on conducting the investigation with FBI's help for recognizing the hackers. The health care expressed regret due to any difficulties the event caused, the memo indicated.

Meanwhile, extra protection has been enforced at Aurora for stopping the kind of incidents from occurring again. Further, overall security upgrading has been done of the health system's PC-network, with all computers equipped with illegitimate access detection technology, whilst mobile PCs' storage units equipped with beneficial encryption mechanism.

Officially Aurora notified that it considered cyber-security with utmost seriousness while it'd run awareness/training sessions so caregivers could know of cyber-dangers.

The notification that Chief Human Resources Officer Amy Rislov signed concludes with important instructions for keeping intact computers' along with caregivers' security at Aurora. Softpedia.com reported this, March 13, 2015.

Moreover, personnel have been directed for resetting their passwords frequently while avoiding logging into personal A/Cs on social-networking sites via Aurora workstations. They've also been urged for eschewing viewing attachments/URLs that arrived through dubious-appearing e-mails.

Read more... - Aurora Health Care C...
 
GCSO Cautions Citizens about Scam E-mail PDF Print E-mail
Written by Administrator   
Friday, 27 March 2015 08:00

One fresh e-mail fraud is circulating in the Lakelands so GCSO, the Office of Greenwood County Sheriff, has issued an alert to citizens for remaining watchful, thus published gwdtoday.com dated March 14, 2015.

Potential victims receiving the new fraudulent e-mail learn that the sender is U.S. Bureau of Defaulters under FTC (Federal Trade Commission) while an arrest warrant is attached to detain them. It's written in the e-mail that there's just 24-hrs for the user to reply else undergo legal action for committing fraud. But, there's a big mistake within the e-mail i.e., the organization Bureau of Defaulters doesn't really exist.

GCSO's Commander Capt. Dale Kittles of the Community Services Unit described the e-mail fraud as certain two-pronged assault against the e-mail receiver. One, by replying to the scam e-mail, the receiver could fall into the trap of remitting money to the scammers who convinced him that he/she would get imprisoned incase the situation wasn't solved instantly. The money remittance normally involved wire transfers else payment cards, the Capt. added. Gwdtoday.com reported this.

Another section of the assault, according to Kittles, was the attached arrest warrant that was actually malicious software.

The Office of Anderson County Sheriff also within SC alerted residents about one likewise scam e-mail following complaints pouring in about the same.

Specialist in charge of Consumer Education Amy Hebert at FTC says her agency doesn't dispatch the above kind of electronic messages to individuals and that for learning further on how to spot imposters, one should visit the Government Imposter Scams site, published thejournalonline.com, March 11, 2015.

Further, people mustn't follow any random web-link/attachment that's certainly quite hard doing especially, when one is thinking he's into trouble involving a government agency. Fraudsters employ such a scare tactic for enticing victims to follow web-links that actually lead to malware for their PCs.

Besides Herbert advises anybody getting the above kind of e-mail to send the message to This e-mail address is being protected from spambots. You need JavaScript enabled to view it before erasing it completely.

Lastly, following a complaint that may be lodged with FTC's ftc.gov/complaint, the complainant should go to the ID-theft site of FTC that delineates the measures he can adopt for lessening his risk.

Read more... - GCSO Cautions Citize...
 
Customers of Cox Communications Warned about Phishing Scam PDF Print E-mail
Written by Administrator   
Thursday, 26 March 2015 06:00

8newsnow.com reported on 17th March, 2015 stating that Cox Communications had recently warned its customers about a possible phishing email scam which is currently rolling out.

It may be noted that Cox Communications is a privately owned subsidiary of Cox Enterprises providing telecommunications, digital cable television and Home Automation services in the United States.

Company's officials said that customers of its Southern Nevada might have received an email stating that their Cox billing information was outdated and if they didn't act immediately then their services would be terminated. The official looking email requested recipients to activate a web link for updating their billing record.

Mynews3.com published a statement on 16th March, 2015 quoting Juergen Barbusca, Manager of Communications for Cox, as saying "Some of our markets reported about this phishing emails and so we checked with our call center here and found that some customers complained about receipt of this email. Although it was not a large number but we still felt to warn our customers."

Cox has estimated that around 420,000 customers in Southern Nevada might have been affected by this trick.

8newsnow.com published a report on 17th March, 2015 quoting a statement on the phishing scam issued by Cox communications as "While the email seems to have a genuine business purpose but it was never generated or distributed by Cox communications. This malicious phishing email is trying to extract personal information from the recipient and anyone receiving it should not click on the link and delete it from their email inbox immediately. Cox Communications never send such messages to its customers in this manner to ask updated information about their accounts. In fact, when our customers proactively contact us via phone, we follow regular business method to verify and update the account of the customer at that time only. Customers of Cox are requested to forward suspicious emails to an internal group of workers at This e-mail address is being protected from spambots. You need JavaScript enabled to view it for handling."

Finally, Cox Communications is not the only service provider to be attacked by scammers recently because during first week of March 2015, phishing emails emerged which looked like they were sent by largest Internet service provider of Brazil warning recipients about an unpaid bill. But in fact, the emails contained a link which was designed to hack the router equipment of that same ISP.

Read more... - Customers of Cox Com...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1252
Polls
The Spamproblem is
 
Who's online
We have 43 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us