hacker email

What Can a Hacker Do With Your Email Address?

Email might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all of your online accounts and determine what your security question answers are based on the interests the hacker would discover in the content of your emails. It’s important to have application based two-factor authentication, not email or SMS (text message). If you are unsure about what you should do in the event your email account is taken over by a hacker, check here. (more…)

malware terminology

The Terminology of Malware – What You Need to Know

Computer Virus

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros (software code inside of a Word document) to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. (more…)

briggs stratton

Briggs Stratton Healthcare Information Breach 2017

Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen.

NATURE OF THE BREACH

Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information from approximately July 25, 2017, to July 28, 2017. Briggs became aware of this incident on July 25, 2017, and took extreme steps to both contain and thoroughly investigate the attack. Although Briggs has no evidence of misuse of the stolen information, they notified individuals out of an abundance of caution. The malware, by its nature, could have allowed a third party to access, use, and disclose individuals’ account-related, human resources, and health plan information as listed on the sample copy of the notice enclosed, the public letter says. (more…)