York

now browsing by tag

 
 

#infosec | Fake Exec Tricks New York City Medical Center into Sharing Patient Info

Source: National Cyber Security – Produced By Gregory Evans

An employee at a New York City medical center was tricked into giving out patient information by a threat actor purporting to be one of the facility’s executives. 

The data was shared by an individual at community-based non-profit the VillageCare Rehabilitation and Nursing Center (VCRN) who had received what they believed to be a genuine email from a senior member of staff. 

VCRN were notified on or about Monday, December 30, that a cruel deception had taken place.

In a Notice of Data Privacy Incident statement published on VCRN’s website, the company stated: “The unauthorized actor requested certain information related to VCRN patients. Believing the request to be legitimate, the employee provided the information.”

Information obtained by the threat actor included first and last names, dates of birth, and medical insurance information, including provider name and ID number for 674 patients. 

VCRN said: “Once it became apparent that the email received by the employee was not a legitimate request, we immediately launched an investigation with the assistance of third-party forensic specialists to determine the full scope of this event.”

The medical center said that they weren’t aware of any personal patient information having been misused as a result of this event.

Becoming a victim of a phishing scam has led VCRN to review its cybersecurity practices.

The center said: “We take this incident and security of personal information in our care seriously. We moved quickly to investigate and respond to this incident, assess the security of relevant VCRN systems, and notify potentially affected individuals. This response included reviewing and enhancing our existing policies and procedures.”

VCRN has taken steps to notify all the patients who have potentially been impacted by the cyber-attack. A toll-free dedicated assistance phone line has been established for patients who wish to discuss any concerns they may have as a result of the incident. 

The data breach has been reported to law enforcement and to the relevant regulatory authorities. 

VCRN advised patients “to remain vigilant against incidents of identity theft and fraud and to review account statements, credit reports, and explanation of benefits forms for suspicious activity and report any suspicious activity immediately to your insurance company, health care provider, or financial institution.”  

____________________________________________________________________________________________________________________

#infosec #itsecurity #hacking #hacker #computerhacker #blackhat #ceh #ransomeware #maleware #ncs #nationalcybersecurityuniversity #defcon #ceh #cissp #computers #cybercrime #cybercrimes #technology #jobs #itjobs #gregorydevans #ncs #ncsv #certifiedcybercrimeconsultant #privateinvestigators #hackerspace #nationalcybersecurityawarenessmonth #hak5 #nsa #computersecurity #deepweb #nsa #cia #internationalcybersecurity #internationalcybersecurityconference #iossecurity #androidsecurity #macsecurity #windowssecurity
____________________________________________________________________________________________________________________

Source link

The post #infosec | Fake Exec Tricks New York City Medical Center into Sharing Patient Info appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | The New York Times gloats over Harvey Weinstein’s misfortune

Source: National Cyber Security – Produced By Gregory Evans   The New York Times gloats over Harvey Weinstein’s misfortune By David Walsh 22 January 2020 “Every punishment, which does not arise from absolute necessity, says the great Montesquieu, is tyrannical.” Cesare Beccaria, On Crimes and Punishments The trial of film producer Harvey Weinstein, on five […] View full post on AmIHackerProof.com

#deepweb | Trips in the Dark – The New York Times

Source: National Cyber Security – Produced By Gregory Evans

FRIDAY PUZZLE — In December, Smithsonian magazine contacted me to ask for a comment on the end of the decade in crossword puzzles. I was in the process of writing my own take on this, but I don’t think it will surprise anyone that I jumped on an opportunity to offer my opinion. The magazine assigned a reporter, Ryan Patrick Smith, to write the retrospective, and we had a very nice chat. He has linked to his article in the constructor notes below.

Mr. Smith mentioned in passing that he was also constructing crosswords, and was excited to see his first puzzle published in The New York Times. And now we get to celebrate his debut.

My first impression when I saw his grid was that this was going to feel like four different puzzles because of the large, black square “plus sign” dividing the grid. I wasn’t wrong, but while I missed the long, luxurious entries in a more open themeless grid, his fill was very interesting. Not only did he debut five entries, but there was also something for everyone here.

The cluing, which might be mostly the puzzle editors’s work, is not only cranked up to offer a good tug-of-war between puzzle and solver, but hits a very satisfying variety of topics as well.

And that’s pretty much all a solver can ask for on a Friday, isn’t it?

1. The A.V. CLUB used to be a part of the humor newspaper (Hi, kids! Yes, it used to be in print) The Onion.

15A. TIL that Lt. SULU of “Star Trek” was named after the SULU Sea.

17A. The actress OLIVIA WILDE makes her New York Times Crossword full name debut, clued as the director of “Booksmart.”

20A. It would probably help to explain the plot of this movie. The 1940 film “REBECCA,” Alfred Hitchcock’s American directorial debut, is about the wives of the brooding widower, Maxim de Winter, played with suitably furrowed brow by Laurence Olivier. His first wife, REBECCA, has died before the film begins, but Mr. de Winter soon meets Joan Sutherland and she becomes his second wife, thereby earning the right to be called REBECCA as well. He eventually takes his new bride back to his windswept estate, REBECCA (pronounced Manderley), and introduces her to the foreboding housekeeper Mrs. Danvers, who in all likelihood is also called REBECCA. Mrs. Danvers, driven to derangement by the fact that almost everyone in the movie is named REBECCA, sets fire to the estate, but everyone besides her escapes so that they can eventually name their children REBECCA.

21A. If you have not seen the web series “The Misadventures of Awkward Black Girl,” by ISSA RAE, you can watch Season 1 on YouTube.

25A. Fun fact: The word “clue” is derived from the Greek myth about Theseus and ARIADNE. Theseus had to make his way out of a complicated maze without being killed by the Minotaur, so ARIADNE, who was crushing on Theseus, gave him a ball of yarn — called a “clew” — to unravel as he traveled, so he would not get lost. The word “clew” eventually became “clue.”

45A. Nice wordplay. “Trips in the dark” could mean that you accidentally fall over something on your way to the bathroom or kitchen at night, or it could mean a trip you take when it’s dark out. If you are flying to a destination in the dark, you could be taking the REDEYE.

46A. “German marks” is not currency in this puzzle. They are diacritical marks, or, more specifically, UMLAUTS.

57A. You can make a pit stop (a “fast stop”), or you can do something to break a fast (“made a fast stop”). The answer is ATE.

60A. TIS the season to figure out that TIS can precede “the season.”

11D. THERESA MAY also makes her full name debut in the New York Times Crossword, but not for the same reason as OLIVIA WILDE.

25D. I was thinking about togas when I should have been thinking about APES. “Caesar” was a character from the “Planet of the Apes” reboot.

37D. Who knew? Apparently, the prime minister of Canada, Justin TRUDEAU, has worked at various times of his life as a bouncer and a snowboarding instructor.

38D. This sent me down a rabbit hole of research, first trying to remember their surnames (the Montagues and the Capulets, but that wasn’t right), even trying to remember the act or scene in which they died. Once again, I claim the award for most overthinking: The answer is TITULAR. The play is “Romeo and Juliet,” not “Romeo and Juliet and Mercutio and Tybalt.”

I’ve been a word nerd and puzzle junkie for most of my life, but my love of crosswords in particular blossomed when I was in high school. I fondly remember sitting in the kitchen with my mom and tackling the weekend grids on her clunky desktop, the clatter of the keyboard a satisfying soundtrack to my solving.

Wordplay veterans may remember me by my erstwhile forum handle “rpsmith” — I’ll always be grateful to this community for encouraging my passion. Outside the “crossworld,” I’m a voracious consumer of film and video games, as well as a writer for both Smithsonian.com (for which I recently wrote a piece on crosswords, as it happens) and the World Bank’s Connect4Climate division. I’m also starting to compete in screenwriting contests!

I had a number of puzzles published in The Stanford Daily during my time on The Farm (including cryptics, which I love), but this is my first submission to The Times that was accepted, and I’m over the moon to see it in print and online. I very nearly didn’t send in this puzzle at all, as I was coming off a sizable string of rejections and felt rather demoralized. So glad I gave it a shot!

It occurs to me now that the upper half of this puzzle is packed with nods to influential women whose domains range from international politics, acting and filmmaking to pages of fiction and mythology. I can’t say that this was strictly intentional on my end, but I’m delighted with the way it panned out.

I’m pleased to say I already have fresh grids in the submission pipeline, so with luck you’ll be seeing more of me before too long.

Happy solving, and a fine new year to all!

Almost finished solving but need a bit more help? We’ve got you covered.

Warning: There be spoilers ahead, but subscribers can take a peek at the answer key.

Trying to get back to the puzzle page? Right here.

Your thoughts?

Source link
——————————————————————————————————

The post #deepweb | <p> Trips in the Dark – The New York Times <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | An interview with historian Clayborne Carson on the New York Times’ 1619 Project

Source: National Cyber Security – Produced By Gregory Evans   “The saddest part of this is that the response of the Times is simply to defend their project” An interview with historian Clayborne Carson on the New York Times’ 1619 Project By Tom Mackaman 15 January 2020 Clayborne Carson is Professor of History at Stanford […] View full post on AmIHackerProof.com

New York offers free #cyber #security #tools to #public to deter #hackers

New York City will offer free cyber security tools to the public as part of a new effort to improve online safety, officials said on Thursday, a week after Atlanta was hit with a ransomware attack that knocked some municipal systems offline.

The program, dubbed NYC Secure, will launch a free smartphone protection app to warn users when suspicious activity is detected on their devices, New York Mayor Bill de Blasio announced at a news conference.

“New Yorkers aren’t safe online. We can’t wait around for other levels of government to do something about it or the private sector,” New York Mayor Bill de Blasio said.

The program will cost the city about $5 million per year, he said.

“It’s our job in government to make sure that people are safe online. It’s a new reality,” de Blasio said.

City agencies will also beef up security protection on public Wi-Fi networks by the end of the year to protect residents, workers and visitors.

Those networks will be secured with a tool, dubbed Quad9, that is available to anybody in New York City and beyond at quad9.net Quad9 routes a user’s web traffic through servers that identify and block malicious sites and email.

NYC Secure was unveiled as Atlanta officials worked alongside federal law enforcement and technicians from private security firms to investigate the cause of the attack that encrypted data on computers.

Atlanta City Council President Felicia Moore said she was waiting to hear more about how the hackers breached city networks, the scope of the attack and when city services would be fully operational.

“Everybody in the public wants to know. I want to know, too,” Moore said at a news conference. “But I do think that we need to give them an opportunity to get the information.”

Atlanta on Thursday reactivated a website that allows residents to make requests for trash pickup, report traffic signal outages and ask for other public works-related services.

Municipal court services remained offline on Thursday and City Hall employees told Reuters their work computers were still unusable a week after the hack was detected.

advertisement:

The post New York offers free #cyber #security #tools to #public to deter #hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

New York is #quietly working to #prevent a major #cyber attack that could bring down the #financial #system

Source: National Cyber Security News

Five months before the 9/11 attacks, US Secretary of Defense Donald Rumsfeld sent a memo to one of his advisers with an ominous message.

“Cyberwar,” read the subject line.

“Please take a look at this article,” Rumsfeld wrote, “and tell me what you think I ought to do about it. Thanks.”

Attached was a 38-page paper, published seven months prior, analyzing the consequences of society’s increasing dependence on the internet.

It was April 30, 2001. Optimistic investors and frenzied tech entrepreneurs were still on a high from the dot-com boom. The World Wide Web was spreading fast.

Once America’s enemies got around to fully embracing the internet, the report predicted, it would be weaponized and turned against the homeland.

The internet would be to modern warfare what the airplane was to strategic bombers during World War I.

The paper’s three authors — two PhD graduates and the founder of a cyber defense research center — imagined the damage a hostile foreign power could inflict on the US. They warned of enemies infecting computers with malicious code, and launching mass denial of service attacks that could bring down networks critical to the functioning of the American economy.

Read More….

advertisement:

View full post on National Cyber Security Ventures

secureCISO New York

Source: National Cyber Security News

General Cybersecurity Conference

 April 12, 2018 | New York City, New York, United States

Cybersecurity Conference Description

This is where the who’s who of Enterprise IT Security convene – a collaboration toward a more secure enterprise. IT starts here.

The tools and event map have attendees engaged in thought leading discussions as they discuss, debate and challenge the Clear & Present dangers of enterprise vulnerability.

It’s no longer if – but when. Our attendees leave equipped with the power, knowledge and experience of a community.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Security Engineer -New York, NY

Security Engineer -New York, NY

Responsibilities

Check Point’s mission is to provide industry-leading security solutions that redefine the security landscape. We achieve our mission by constantly developing innovative and cutting edge technology solutions focused on real customer needs, while challenging ourselves to grow and excel.

If you want to be part of the fascinating and fast growing Cyber Security industry, where your unique talent and value will be recognized, Check Point Software Technologies is where you want to be.

Join now and become a part of the success story that secures tens of thousands of organizations of all sizes around the globe.

Join Check Point’s leading sales team and take your career one step ahead!

  • Provide pre-sales technical support to Check Point Channel/Account Managers and strategic Check Point Customers, developing POC’s & architecting revenue generating services that drive sales
  • Conduct technical meetings with customers and partners to highlight our products and solutions. Perform design work for end users, partners, and resellers
  • Conduct technical pilots and competitive reviews
  • Hold on-going education sessions with our Partners
  • Perform limited post-sales support

 #

Desired Background

  • BS, EE/CS degree or technical school certificate
  • 5 years in networking standards and protocols (Ethernet, routing, Unix, Network Mgr., Internet Protocol addressing)
  • Strong data communication experience
  • Working knowledge of system design
  • Strong security and networking background
  • Some travel required
  • Check Point experience and certification preferred

 EOE M/F/Veterans/Disabled

View full post on National Cyber Security Ventures

Fancy Bear #hackers are now #exploiting the #New York terror attack to #spread their #malware

Source: National Cyber Security – Produced By Gregory Evans

Fancy Bear #hackers are now #exploiting the #New York terror attack to #spread their #malware

As the US justice department forges ahead with its investigation into the Trump administration and any possible collusion with Russia, the Fancy Bear hackers continue refining their attacks against global targets. As part of their new phishing campaign, the hackers are capitalising on the recent New York terror attack, to trick users into clicking on malicious documents, which in turn infects systems with their malware.

The Kremlin-linked hackers first made headlines during the 2016 US presidential campaign and are now widely considered to have orchestrated the cyberattacks against the US Democratic Party. The cyberespionage group has since been actively involved in various campaigns over the past year, targeting organisations and individuals across the globe.

The Fancy Bears’ most recent campaign, uncovered by security researchers at McAfee, involves the use of a black malicious document, titled “IsisAttackInNewYork”, which when clicked drops the hackers’ first-stage reconnaissance malware dropper Seduploader. The implant collects basic data from infected PCs and profiles prospective victims. Once hackers determine some interest in the victim, the implant then drops Fancy Bears’ customised malware X-Agent or Sedreco.

The post Fancy Bear #hackers are now #exploiting the #New York terror attack to #spread their #malware appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The New York Cyber Security Regulation

Source: National Cyber Security – Produced By Gregory Evans

As the Sinatra tune goes (a bit paraphrased) … New York: If you can make it there in cybersecurity, you can make it anywhere. The financial services industry is girding for the new regulations by the New York State Department of Financial Services (DFS), which take effect as of Aug….

The post The New York Cyber Security Regulation appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures