Hackers - Machado Consulting's News You Can Use | Worcester, Massachusetts | Machado Consulting

Login

Machado Consulting's News You Can Use

Welcome to our blog where you can find everything from tech-tips to keeping your data secure. Have any questions? We'd love to hear from you!

The Top Five Health Care Data Breaches So Far

The Top Five Health Care Data Breaches So Far

Companies in any industry can be susceptible to data breaches. Despite the ongoing pandemic which has many people working from home, cyberattacks aren’t slowing. This goes to show that cybercriminals will stop at nothing to steal your information. At a time when people should be working together to combat a global crisis, there are individuals out there who see an opportunity to take advantage of others. 

Perhaps the most despicable of these attacks are carried out against health care companies, the very organizations that need the most support during a pandemic. Their workers are on the frontlines working incredibly hard to save lives and improve health outcomes. But where most people see a brave group of health care workers, others see an opportunity.

Continue reading
0 Comments

Garmin Hacked: A Cybersecurity Lesson for Your Business

Garmin Hacked: A Cybersecurity Lesson for Your Business

Running a business poses many challenges, and while all need to be taken seriously, some are of greater importance than others. If, for instance, your company has cash flow problems, that’s urgent. In fact, it’s why 82% of small business failures occur. Just as urgent but more invisible to the naked eye is security. Security needs to be a top priority for any business because, like it or not, you’re already under attack. Cybercriminals don’t wait around. They don’t ask politely to see if you’re ready before they start sending phishing emails and trying to compromise your employees’ accounts. They also have no issue holding your systems hostage. Unfortunately, Garmin found this out firsthand. 

Continue reading
0 Comments

What the Twitter Hack Reveals About Your Cybersecurity

What the Twitter Hack Reveals About Your Cybersecurity

Twitter is a popular social media platform where users can connect and share their thoughts with a wide variety of audiences. Users generally trust that Twitter keeps their information safe, but that trust appears to have been shaken after a very public and dramatic hack that recently revealed glaring holes in Twitter’s security. 

On July 15th, 2020, a number of high-profile Twitter accounts—including those of Barack Obama, Joe Biden, Elon Musk, Kanye West, and Warren Buffet—were briefly taken over by hackers and used to promote a Bitcoin scam. 

Twitter locked things down late Wednesday, restricting the ability of any verified account to send tweets as well as restricting other functionality as well. According to Twitter, about 130 accounts were targeted by the attack, and of this number, only a small subset was compromised and used to tweet. Still, given the broad reach of the affected profiles, millions likely saw the messages the attacker(s) sent out. The scam quickly netted over $115,000 in BitcoinBitcoin, which, for reasons explained later, was relatively unremarkable. 

Continue reading
0 Comments

The Endless Line of Costs from a Data Breach

The Endless Line of Costs from a Data Breach

Picture this… In your office you have a bag filled with thousands of envelopes. In each envelope there is $242 in cash. Unbeknownst to you, a thief has gained access to your office, but you don’t realize this until 279 days later. How much is this going to cost your business?

Continue reading
0 Comments

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness of an issue doesn’t always result in preventing attacks. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

Continue reading
0 Comments

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Continue reading
0 Comments

Securing Your Business from the Internet of Things

Securing Your Business from the Internet of Things

Now that the holidays have come and gone, you might have a couple of new gadgets in your home or office that connect to the Internet. Depending on what these gadgets are, you might have a serious security issue sitting right in front of you without realizing it. Some devices that don’t normally connect to the Internet--also known as Internet of Things devices (IoT)--aren’t as secure as you’d like them to be, particularly in a business environment.

Continue reading
0 Comments

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

Continue reading
0 Comments

Looking Back at This Year’s Cybersecurity Issues

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

Continue reading
0 Comments

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Faxploit: Hundreds of Printers Putting Businesses at Risk of Malware

Printers, along with every other piece of equipment that is on your network, require careful configuration and regular upkeep to ensure that they aren’t putting your data and users at risk. Security researchers recently discovered two massive vulnerabilities in HP Officejet All-in-One printers that make it incredibly easy for hackers to spread malware and gain access to a company’s network.

Continue reading
0 Comments

Tech Term: Hacker

Tech Term: Hacker

The term “hacker” is possibly one of the best-known technology-related terms there is, thanks to popular culture. Properties like The Girl with the Dragon Tattoo and the Die Hard franchise have given the layman a distinct impression of what a hacker is. Unfortunately, this impression isn’t always accurate. Here, we’ll discuss what real-life hackers are like, and the different varieties there are.

Continue reading
0 Comments

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Continue reading
0 Comments

Is Your Security Prepared to Stop a DDoS Attack?

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Charity Scams Are Very Real. Here’s How To Dodge Them

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.

Continue reading
0 Comments

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.

Continue reading
0 Comments

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

Continue reading
0 Comments

W-2 Phishing Scams on the Rise FBI and IRS Reports

W-2 Phishing Scams on the Rise FBI and IRS Reports

The FBI and IRS have repeatedly warned the public about W-2 phishing scams, and that number has significantly increased this year. W-2 scams are hitting everywhere, even a Cybersecurity Contractor was hit with one of these!

Continue reading
0 Comments

GMail will no longer allow the sending of JavaScript files

GMail will no longer allow the sending of JavaScript files

There should be few reasons to send a JavaScript file (.js) through email, but if you do find yourself trying to send, you may run into some trouble. Starting in February of 2017, Gmail will block all .js files. Gmail is even able to detect .js files within a compressed file such as ZIP, TGZ, GZ, RAR, TAR, etc..

Continue reading
0 Comments

Search Blog

Subscribe to Our Blog