Investments in Cyber Security Increase Following Major Data Breaches

With the increasing rate at which major companies are being breached, many are realizing the need for Cyber Security. The vulnerability of important data is being exploited by hackers around the world prompting firms to invest millions in cyber security startups as they become aware of the vitality and importance of Cyber Security.

Read more…

Find out how Cino Ltd. Companies can help protect your data by clicking here.

Federal Employee Personnel Records Compromised in Cyber Security Breach

On the heels of a June 4th announcement pertaining to a security breach that has compromised the personnel records of current and former Federal employees comes another announcement stating that additional systems were also compromised.

The affected systems contain sensitive information related to the background investigations of current, former and prospective Federal employees as well as those for whom a Federal background investigation was conducted.

Click here to read more.

IC3 Issues Alert on CryptoWall Ransomware

The Internet Crime Complaint Center has issued an alert warning that U.S. individuals and businesses are still at risk of CryptoWall Ransomware fraud.

Click here to learn more.

LastPass Breached: Are Your Passwords Safe?

LastPass, an online password storing company has been hacked. The encrypted master passwords, email addresses and password reminders of their customers could now be in the hands of hackers.

The breach was detected last Friday and LastPass is confident the vast majority of the data stored remains protected. Nonetheless, they have taken new measures to ensure the security of the data that was not compromised.

Investing in Cyber Security

With reports of security breaches and stolen data on the rise, many corporations are overhauling their Cyber Security programs and practices.

This lack of a sense of security is causing investors to take notice while stocks in Cyber Security are on the rise.

4 Million Breached by Suspected Chinese Hackers

U.S. officials suspect that as many as 4 million government workers suffered a breach of their personal records by Chinese hackers. The Federal Bureau of Investigation, F.B.I., is currently investigating the breach which is believed to be one of the largest known thefts of government data.

Cyber Security experts also suspect these same hackers may be responsible for similar thefts of personal data at major healthcare firms Anthem and Premera.

Guidance for Defending Against Destructive Malware

National Cyber Awareness System:

The National Security Agency (NSA)’s Information Assurance Directorate has released a report on Defensive Best Practices for Destructive Malware. This report details several  steps network defenders can take to detect, contain and minimize destructive malware infections.

US-CERT encourages users and administrators to review the NSA report and ICS-CERT TIP-15-022-01 for more information on destructive malware.

Microsoft Releases February 2015 Bulletin

National Cyber Awareness System

Microsoft has released updates to address vulnerabilities in Windows as part of the Microsoft Security Bulletin Summary for February 2015. Some of these vulnerabilities could allow remote code execution, security feature bypass, elevation of privilege, or disclosure of information.

US-CERT encourages users and administrators to review Microsoft Security Bulletin Summary MS15-FEB and apply the necessary updates.

Linux “Ghost” Remote Code Execution Vulnerability

National Cyber Awareness System:

The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.

US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu and Red Hat. The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.