
Airbus suffered a data breach.
Aerospace giant Airbus has become the latest victim to hackers, they said the company suffered a cyber attack that lead to a massive data breach which released billions of records onto the Dark Web.
“Airbus SE detected a cyber incident on Airbus ‘Commercial Aircraft business’ information systems, which resulted in unauthorized access to data,” the company says in a statement issued on Wednesday. “There is no impact on Airbus’ commercial operations.”
After reviewing the leaked records called “Collections #2-5” it contain a massive 2.2 billion stolen account records. Which is many millions of accounts shorter than the Collections #1 Dump
… Read the rest“2.2 billion records is a staggering number,” said Frederik Mennes, senior manager of Market & Security Strategy, Security Competence Center at OneSpan, via email. “Companies should remember that easy targets will continue to be exploited first, because cybercrime follows the path of least resistance. Applying multi-factor authentication may stop an

Is Microsoft OneDrive HIPAA Compliant?
Are you looking to find out if OneDrive is a HIPAA compliant cloud storage solution? We reviewed the Microsoft Trust Center and found a page called HIPAA and the HITECH Act.
Within the document Microsoft states the following:
“Currently there is no official certification for HIPAA or HITECH Act compliance. However, those Microsoft services covered under the BAA have undergone audits conducted by accredited independent auditors for the Microsoft ISO/IEC 27001 certification.”
Since Microsoft OneDrive is bundled into Office 365, we decided to look for a PDF doc for Office 365 and behold Office 365 Compliance Framework for Industry Standards and Regulations . This PDF document offered a deeper insight for OneDrive and its capabilities on HIPAA compliance and the document specifically states that OneDrive for Business can be HIPAA compliant while OneDrive consumer cloud storage is not HIPAA compliant.
So Is Microsoft OneDrive A HIPAA Compliant Service?
The … Read the rest

What is the Tor Browser and should you use it?
The Tor Browser has been around for some time but now should you use it? You do get the anonymity and Tor’s primary benefit is that it encrypts your traffic and bounces it through a chain of computers, making it very difficult for anyone to track where you came from but is this software worth your psyche?
I just want to mention that at least they have a positive Vision? “At the end of the day for Tor what we hope is that our technology becomes underlying, and everything else that happens online happens on top of it,” says Isabela Bagueros, executive director of the Tor Project. “Seeing interest and adoption from for-profit companies and other organizations is a very interesting moment for us, because we are creating different examples to show how our vision can be possible.”
If you have more questions about TOR, Visit the TOR FAQ
However … Read the rest

Firefox 65 improved its online privacy
Mozilla has announced that the latest version Firefox 65 comes with better online privacy controls that makes it easier for you to manage what kind of information you share while you browse the internet.

Apple Disables Group FaceTime due to Major Privacy Glitch
Apple has disabled the Group FaceTime software temporarily due to a software bug that allows other iOS users to listen in on private conversations without any notification to reject or accept a call.
The bug is believed to impact any pair of devices running iOS 12.1 or later, according to reports. Security Experts – like Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation – urged iOS users to delete the FaceTime function until a fix becomes available.
- Fixing WebView2 Issues on ARM64: Why Outlook and Teams Keep Breaking (and How to Fix Them)
- How to Enable Auto Recording & Transcription in Microsoft Teams and Assign Meeting Policies to All Users
- How to Install SentinelOne on Ubuntu 24.04
- How to Completely Remove SentinelOne from Ubuntu 24.04
- PowerShell Script to Force Uninstall Umbrella Roaming Client

Say Goodbye to Windows 7
Goodbye Windows 7 you were loved by almost everyone and was definitely better than Windows VISTA. Many users and company’s are still using windows 7 not realizing what will happen at the end of the year.
NetMarketShare’s states that 36.90% are still using Windows 7 which is fairly high. This will be the year for many computer migrations. As you know like all operating systems before it, Windows 7 will eventually reach the (EOL) end of its life-cycle which is on January 14, 2020 making an upgrade an absolutely essential for the safety of your PC. This means that your computer will no longer be getting security patches and will be vulnerable to hackers. Companies will also have to go through Server 2008 and windows 7 migrations to later Windows OS to maintain Compliance’s.… Read the rest

Top Scam Emails You Should Be Vigilant About
Scam emails have evolved to a point that make it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands to trick victims into providing credentials over a fake landing page.
Roughly one in four Americans in constantly online. According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.
Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the most experienced web surfer.
So What Are Most Common
… Read the rest
Phishing Campaign Delivers A Double Hitter
A phishing attack is being sent with Word attachments that deliver both the Gandcrab ransomware and Ursnif executable. This phishing campaign was detected by researchers at Carbon Black, this attack has hit infected systems with a lethal attack combination that harvests credentials, gathers system and process information and afterwards it encrypts data in order to extort payments from victims.
Jared Myers, senior threat researcher for Carbon Black stated “The campaign appears to be ongoing, as we are seeing additional payloads being posted on pastebin.com that are almost identical to the payloads that were leveraged to data extracted from our analysis of these samples.”
The Attack
The initial phishing emails included a Microsoft Word document that delivers the early stages of the attack. “The overall attack leverages several different approaches, which are popular techniques amongst red-teamers, espionage-focused adversaries and large-scale criminal campaigns,” said Carbon Black researchers in a Thursday analysis.

Best Free Antivirus For 2019
So you looking for 2019’s best Free Antivirus Software to Protect Your Computer From Viruses & Malware. Let me give you some details on the best Free Antivirus. Remember Paid AV is always better than free AV.
Bitdefender Antivirus Free Edition
Simple and Easy
Rating: 8/10
Download
Pros: Top protection against malware; super-easy to use; small performance impact
Cons: No customization options; no quick scans or scan scheduling
Bitdefender is minimal and does not take up much resources even during scans.
Kaspersky Free Antivirus
Lean and mean.
Rating: 8/10
Download
Pros: Excellent malware protection; moderate performance hit; fast scans
Cons: Minimal but has a few extra features
Kaspersky has some more advanced functions compared to others but during scans it can slow down your computer.
Avast Free Antivirus
Nearly a free suite.
Rating: 7/10
Download
Pros: Loaded with extra features; high customization; VPN client
Cons: Malware protection not great; … Read the rest

DHS Issue Urgent Warning on Domain Name Service Hijacking
The Department of Homeland Security states that some agencies are being targeted by specific attacks that modify the Domain Name System Records, which critical function of the processes to locate websites.
DHS issued an emergency statement giving government agencies 10 days to verify that their DNS records are accurate. There has been a series of incidents where email and website traffic has been redirected.
The DHS’s Cyber Security Team said it “is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them,” .
Cyber attacks that target DNS systems can be quite powerful. By modifying a DNS record it can allow an attacker to see traffic flowing to a website or service. They can also craft effective phishing attacks to collect login username and passwords for anything. Hackers can also set a different IP address for the domain … Read the rest