Monthly Archives: January 2019


Is Microsoft OneDrive HIPAA Compliant?

Are you looking to find out if OneDrive is a HIPAA compliant cloud storage solution? We reviewed the Microsoft Trust Center and found a page called HIPAA and the HITECH Act.

Within the document Microsoft states the following:

“Currently there is no official certification for HIPAA or HITECH Act compliance. However, those Microsoft services covered under the BAA have undergone audits conducted by accredited independent auditors for the Microsoft ISO/IEC 27001 certification.”

Since Microsoft OneDrive is bundled into Office 365, we decided to look for a PDF doc for Office 365 and behold Office 365 Compliance Framework for Industry Standards and Regulations . This PDF document offered a deeper insight for OneDrive and its capabilities on HIPAA compliance and the document specifically states that OneDrive for Business can be HIPAA compliant while OneDrive consumer cloud storage is not HIPAA compliant.

Is Microsoft OneDrive HIPAA Compliant?

So Is Microsoft OneDrive A HIPAA Compliant Service?

The … Read the rest


What is the Tor Browser and should you use it?

The Tor Browser has been around for some time but now should you use it? You do get the anonymity and Tor’s primary benefit is that it encrypts your traffic and bounces it through a chain of computers, making it very difficult for anyone to track where you came from but is this software worth your psyche? 

I just want to mention that at least they have a positive Vision? “At the end of the day for Tor what we hope is that our technology becomes underlying, and everything else that happens online happens on top of it,” says Isabela Bagueros, executive director of the Tor Project. “Seeing interest and adoption from for-profit companies and other organizations is a very interesting moment for us, because we are creating different examples to show how our vision can be possible.”

If you have more questions about TOR, Visit the TOR FAQ

However … Read the rest


Firefox 65 improved its online privacy

Mozilla has announced that the latest version Firefox 65 comes with better online privacy controls that makes it easier for you to manage what kind of information you share while you browse the internet.

In a blog post detailing the tools, Mozilla explains how it has redesigned the controls for Content Blocking in Firefox 65, with it explaining that “When it comes to user privacy, choice and control are first and foremost.”
On another note this new privacy aware browser would probably go great with duckduckgo search engine. 
Read the rest

Apple Disables Group FaceTime due to Major Privacy Glitch

Apple has disabled the Group FaceTime software temporarily due to a software bug that allows other iOS users to listen in on private conversations without any notification to reject or accept a call.
The bug is believed to impact any pair of devices running iOS 12.1 or later, according to reports. Security Experts – like Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation – urged iOS users to delete the FaceTime function until a fix becomes available.

Read the rest

Say Goodbye to Windows 7

Goodbye Windows 7 you were loved by almost everyone and was definitely better than Windows VISTA. Many users and company’s are still using windows 7 not realizing what will happen at the end of the year.

NetMarketShare’s states that 36.90% are still using Windows 7 which is fairly high. This will be the year for many computer migrations. As you know like all operating systems before it, Windows 7 will eventually reach the (EOL) end of its life-cycle which is on January 14, 2020 making an upgrade an absolutely essential for the safety of your PC. This means that your computer will no longer be getting security patches and will be vulnerable to hackers. Companies will also have to go through Server 2008 and windows 7 migrations to later Windows OS to maintain Compliance’s.… Read the rest


Top Scam Emails You Should Be Vigilant About

Scam emails have evolved to a point that make it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands to trick victims into providing credentials over a fake landing page.

Roughly one in four Americans in constantly online.  According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.

Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the most experienced web surfer.

So What Are Most Common

Read the rest

Phishing Campaign Delivers A Double Hitter

A phishing attack is being sent with Word attachments that deliver both the Gandcrab ransomware and Ursnif executable.  This phishing campaign was detected by researchers at Carbon Black, this attack has hit infected systems with a lethal attack combination that harvests credentials, gathers system and process information and afterwards it encrypts data in order to extort payments from victims.

Jared Myers, senior threat researcher for Carbon Black stated “The campaign appears to be ongoing, as we are seeing additional payloads being posted on pastebin.com that are almost identical to the payloads that were leveraged to data extracted from our analysis of these samples.”

The Attack

The initial phishing emails included a Microsoft Word document that delivers the early stages of the attack. “The overall attack leverages several different approaches, which are popular techniques amongst red-teamers, espionage-focused adversaries and large-scale criminal campaigns,” said Carbon Black researchers in a Thursday analysis.

Read the rest

Best Free Antivirus For 2019

So you looking for 2019’s best Free Antivirus Software to Protect Your Computer From Viruses & Malware. Let me give you some details on the best Free Antivirus. Remember Paid AV is always better than free AV.


Bitdefender Antivirus Free Edition

Simple and Easy
Rating: 8/10
Download

Pros: Top protection against malware; super-easy to use; small performance impact
Cons: No customization options; no quick scans or scan scheduling

Bitdefender is minimal and does not take up much resources even during scans.

 Kaspersky Free Antivirus

Lean and mean.
Rating: 8/10
Download

Pros: Excellent malware protection; moderate performance hit; fast scans
Cons: Minimal but has a few extra features  

Kaspersky has some more advanced functions compared to others but during scans it can slow down your computer.

Avast Free Antivirus

Nearly a free suite.
Rating: 7/10
Download

Pros: Loaded with extra features; high customization; VPN client
Cons: Malware protection not great; … Read the rest


DHS Issue Urgent Warning on Domain Name Service Hijacking

The Department of Homeland Security states that some agencies are being targeted by specific attacks that modify the Domain Name System Records, which critical function of the processes to locate websites.

DHS issued an emergency statement giving government agencies 10 days to verify that their DNS records are accurate. There has been a series of incidents where email and website traffic has been redirected.

The DHS’s Cyber Security Team said it “is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them,” .

Cyber attacks that target DNS systems can be quite powerful. By modifying a DNS record it can allow an attacker to see traffic flowing to a website or service. They can also craft effective phishing attacks to collect login username and passwords for anything. Hackers can also set a different IP address for the domain … Read the rest


MySQL Design Flaw can be leveraged to steal sensitive information

MySQL has released a security statement providing the following information:

The LOAD DATA statement can load a file located on the server host, or, if the LOCAL keyword is specified, on the client host.

There are two potential security issues with the LOCALversion of LOAD DATA:

  • The transfer of the file from the client host to the server host is initiated by the MySQL server. In theory, a patched server could be built that would tell the client program to transfer a file of the server’s choosing rather than the file named by the client in the LOAD DATA statement. Such a server could access any file on the client host to which the client user has read access. (A patched server could in fact reply with a file-transfer request to any statement, not just LOAD DATA LOCAL, so a more fundamental issue is that clients should
Read the rest

Stay Informed

Receive instant notifications when new content is released.