Healthcare sector is finding ways to minimize hackability

healthcare

Did you know that the healthcare industry is a far easier target for hackers to invade than banking or retail is? With more entry points into healthcare systems  cybercriminals can attack medical devices such as CT and PET scanners, MRI machines, and PACS via MEDJACK (medical device hijack) and infect them with malware  thus creating backdoors into your hospital network.

Hackers in the Darknet are already discussing the possibilities...

Read More

That Ashley Madison “Thing”

Ashley Madison thing

I made it though the AdultFriendFinder’s (AFF) craze, barely…

I am not the type of person that likes a lot of media attention. I tend to find my comfort zone in the area of research and writing. Though I can do any company or brand justice in the realm of social media  by nature, I am actually a very quiet and introspective person in regards to my private life. You won’t find me tweeting about a trip to the coast or mountains, until after the fact.

Even when I arrived at the point of doxxi...

Read More

Healthcare hackers & their dirty little secrets

hackers and medical data

In the world of cybersecurity, the healthcare industry is under siege. A Google search for ” healthcare breach ” now yields about 28,000,000 results , where a Google news search returns 100,000 news articles. Stolen healthcare insurance credentials are like a significant other to a hacker and may reveal things we would prefer to keep private and hidden. In 2015, healthcare data breach victims appear to be adrift with little or no protection or navigation.

“The risk for ongoing data exfiltr...

Read More

Travel: Using Wi-Fi in-flight?

Wi-Fi information security when traveling

When you are 30,000 feet in the air and your flight offers Wi-Fi, are you really thinking about hacker Jon who is sitting in seat 44C? Probably not. Most people do not even consider that in-flight Wi-Fi is just like public Wi-Fi at a coffee shop. When you purchase time on an in-flight wireless network, your credit card transaction is encrypted. Once the transaction is complete, your laptop and devices are flying high in their birthday suits, again, if you do not take information security hygie...

Read More

Darknet cybercriminal reflections: They’re so clever!

darknet criminal

I’ve spent a copiousness amount of time on the Darknet this year in a quest to gain more understanding on how cybercriminals think. I’ve been studying their communities, how they operate in the Darknetmarkets, perusing their forums, analyzing their marketing techniques, and contemplating how they justify their criminal activities.It’s been fascinating, and at the same time disconcerting.

OPSEC

It has been fascinating because I have learned so much about OPSEC (operational security), and my lear...

Read More

A breach is found. Now whom do I tell?

data breach

In 2014, the ITRC (Identity Theft Resource Center) tracked 783 data security breaches with 85,611,528 confirmed records exposed. This year appears even more dismal. The ITRC Data Breach Reports 3 for July 7, 2015 captured 411 data incidents with 117,678,050 confirmed records at risk. Since data breaches are a common occurrence in today’s information security threat landscape,  it’s going to become de rigueur for companies to pump up security preparedness within their incident response plan...

Read More

Down the Darknet Rabbit Hole Again

Darknet rabbithole

I’ve been back down the rabbithole, into the Darknet again and it’s been a hell of a hostile and discordant excursion this time. For those of us who are merely researching the cybercriminal ecosystem, it can become an extremely precarious place to visit sometimes. I’ve had noxious miscreants jabbering me, insisting that I hack something to prove that I am who I say I am  some of whom even messaged me direct phishing links...

Read More

My mental health break begins tonight

I work a few jobs: mental health, blogging, and Deepweb research. Lately, I’ve felt the need to disconnect — (if only for a day or two), and the time to disconnect is now. I know my physical and mental limitations, and sometimes I take on too much. When I reach these preconceived limits I either shut down or let the world around me know that the time to disconnect has arrived.

mental health break

The time has arrived

I am disconnecting for the next 24 hours...

Read More

Breach response and information sharing

breach data

Some breaches require notification such as those involving patient data or customer information, but sharing is optional. Of course, notification is just one form of information sharing. For example, February’s executive order encourages private sector companies to share information on cybersecuritythreats.

There are advantages and disadvantages of sharing information with others, and here to talk about it are two information security influencers and Dell Insight Partners, Eric Vanderburg an...

Read More