Monthly Archives: November 2018


Marriott Data Breach hits 500 million Starwood Guests

Marriott Data Breach hits 500 million Starwood guests. It was said that during the investigation, there had been unauthorized access to the Starwood network since 2014. The information copied from the Starwood guest  database over all this time were names, mailing addresses, phone numbers, email addresses, passport numbers, Starwood Preferred Guest (“SPG”) account information, dates of birth, gender, arrival and departure information, reservation dates, and communication preferences.

Starwood brands include: W Hotels, St. Regis, Sheraton Hotels & Resorts, Westin Hotels & Resorts, Element Hotels, Aloft Hotels, The Luxury Collection, Tribute Portfolio, Le Méridien Hotels & Resorts, Four Points by Sheraton and Design Hotels. Starwood branded timeshare properties are also included.

 

 

 … Read the rest


Attempted Breach on DELL EMC Network

There was an attempted breach on DELL EMC customers using Dell.com. The company has been stressing customers to change their passwords.  Dell cybersecurity teams are still not sure on how hackers got access to the information on the website. They are not sure if it was due to vulnerabilities or other causes. But it was said they took proper measures to mitigate any further attacks.

 

Dell Announces Potential Cybersecurity Incident

ROUND ROCK, Texas, Nov. 28, 2018 – Dell is announcing that on November 9, 2018, it detected and disrupted unauthorized activity on its network attempting to extract Dell.com customer information, which was limited to names, email addresses and hashed passwords. Though it is possible some of this information was removed from Dell’s network, our investigations found no conclusive evidence that any was extracted. Additionally, Dell cybersecurity measures are in place to limit the impact of any potential exposure. These

Read the rest

Hackers Breach Dunkin’ Donuts Accounts

Tuesday Dunkin’ Donuts posted an advisory on the website regarding to its credential stuffing attack on the companies data.

 What does This Credential Stuffing mean?

Credential stuffing is a term related to a specific type of hacking that secures user credentials by breaching a system, and then attempts to use those credentials with other systems. Like other kinds of related hacking, credential stuffing attacks rely on hackers being able to get into a network and take out sensitive user information such as passwords and usernames.

Dunkin Brands Inc. (“Dunkin’”) is writing to provide you with information regarding a recent
incident involving your DD Perks account. Although Dunkin’ did not experience a data security
breach involving its internal systems, we’ve been informed that third-parties obtained usernames
and passwords through other companies’ security breaches and used this information to log into
some Dunkin’ DD Perks accounts. One of these may have been … Read the rest


Microsoft Warns of Apps Exposing Private Keys

On Tuesday Microsoft notified users that digital certificates have been compromised for two apps which allowed someone to remotely spoof websites and content.  The issue was that the certificate and private key were the same for anyone who installed these two applications. Which allowed a hacker to decrypt the software’s private key which compromised the security of the windows computers. The certificate became susceptible to attacks like spoofing, phishing, or man-in-the-middle attacks.

November 23, following a vulnerability identified in Sennheiser HeadSetup and HeadSetup Pro, new versions have been made available.

Updating the software to its latest version will rid the software of vulnerable certificates. Additionally, the invalidation by Windows November 27th of the former certificates fully eliminate the possibility to exploit the certificates.

The latest software versions are as follows:

Mac users and Windows users, that
Read the rest

How to Uninstall the Kaseya Agent from Macs.

How to remove Kaseya Agent from Macs  can be a challenge sometimes hopefully these few simple steps can assist you on removing the agent successfully.

  1. Applies to: All VSA’s. Download the following package and extract the zip contents.
    KaseyaUninstall.pkg.zip
     


  2. Run the KaseyaUninstall.pkg installer and choose to Install to the Macintosh Harddrive. Although this appears to be installing a product, it is actually running the uninstallation script for the Kaseya Agent.  (NOTE: You may have to go into System Preferences > Security & Privacy > General Tab to allow the software to run. )

  3. Launch Terminal and run the “rm -rf /var/tmp/kpid” command.

  4. Remove the agent with root rights, i.e. in Terminal run the “sudo rm -rf /var/tmp/kpid” command and then provide the root password

  5. The Kaseya Agent and all associated files should now be removed.
Read the rest

Octobers HealthCare.gov Data Breach Exposed Individuals Personal Information

Octobers HealthCare.gov Data Breach Exposed Individuals Personal Information. The details that were surfaced about the data breach said that around 75,000 consumers were effected. Letters were sent out to affected people from the Centers for medicare and Medicaid Services and it said that the sensitive data exposed may have included Social Security numbers and a variety of other personal information including income, tax filing status, family relationships and immigration status. At least no Financial information was exposed this time around and none of the exposed data included patient diagnosis or treatments.

The  system that was hacked was connected to the Healthcare.gov website. Anyone that used it to sign up for a new insurance plan were compromised, hackers targeted the behind-the-scenes system that insurance agents used to help customers directly enroll in their new plans, and not the consumer Healthcare.gov site itself.

 

 … Read the rest


Maintaining Security with Internet of Things

Our lives have been taken over with many many WiFi enabled capable devices. The internet of things (IoT) has quite a flaw which is security.  Many vendors lax on providing security updates to their software that are used in smartphones, tablets, PC’s , Game Consoles , TV’s , your Fridge and many other devices. This day in age we have to maintain a due-care and due-diligence approach on security for all these IoT devices.

With this in mind, here are seven best practices on security for IoT:

  1. Use security gateways: They have the ability to inspect and audit the communications of your network.
  2. Use VLans: Put all IoT devices in a separate Vlan outside primary business network.
  3. Use strong authentication: Change those consumer devices default passwords!
  4. Disable services: Many devices use telnet, FTP and other risky services that may be exposed to the internet.
  5. Use secure protocols
Read the rest

Skype For Business brought down by the Kitten of Doom Emoji Attack

Crash Skype for Business by sending a large number of emojis 800+ kittens in one message and the client freezes the program for a few seconds. This can be exploited to perform Denial of Service attacks against Skype for Business users and compromises the availability of the program.

How would an attacker go about performing this attack? Well its quite simple, the attacker can continuously send many messages to the chat window and it will freeze the program for all participants in the meeting room and prevent them from using the chat or seeing the video.

 Are you affected?

You could send yourself a few hundred emojis and see if your client freezes but we wouldn’t recommend it. Plus, there is an easier way. Just check if your client is one of these:

  • Skype for Business 2016 MSO (16.0.93).64-Bit or before
  • Lync 2013 (15.0) 64-Bit part of Microsoft Office Professional
Read the rest

Setup Windows 10 System Restore. Not Enabled by Default.

Did you know that Windows 10 does not have system restore configured by default? System Restore comes handy when a patch crashed your system or updated drivers and software that caused unwanted reactions of the computer.

 

1. Find and Open System Restore

At the search box in Windows 10 search for system restore and select Create a restore point from the list. When the System Properties dialog box opens up, click the System Protection tabMake sure (C:)(System) is high lighted then and then click the [Configure] button.

 

 

2. Enabling System Restore

Click on the radio button Turn on system protection. Afterwards use the Max Usage slider to determine how much of your hard drive to use to store. Restore Points — 5% to 10% is usually sufficient then click [OK].

 

 

3. Restoring your PC – Within Windows 10

Now you … Read the rest


User Email Security Tips

Email security isn’t just the email provider or your IT administrator’s responsibility. It’s everybody’s responsibility. We all want to avoid having to produce a new resume. Here are some Safety Tips to help you all be protected and keep spam & malware to an absolute minimum.

  1. Change your password often.
  2. Use strong passwords. Never use a password that contains “password” or “letmein” or “welcome”.
  3. Use a different password for each of your accounts. If you use the same password for your bank account as you do for your email account, you become much more vulnerable to data theft.
  4. Don’t open an attachment unless you know who it is from & are expecting it.
  5. Be cautious about email messages that instruct you to enable macros before downloading Word or Excel attachments.
  6. Use anti-virus software on your local machine, and make sure it’s kept up-to-date with the latest virus updates.
Read the rest

Stay Informed

Receive instant notifications when new content is released.