briggs stratton

Briggs Stratton Healthcare Information Breach 2017

Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen.

NATURE OF THE BREACH

Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information from approximately July 25, 2017, to July 28, 2017. Briggs became aware of this incident on July 25, 2017, and took extreme steps to both contain and thoroughly investigate the attack. Although Briggs has no evidence of misuse of the stolen information, they notified individuals out of an abundance of caution. The malware, by its nature, could have allowed a third party to access, use, and disclose individuals’ account-related, human resources, and health plan information as listed on the sample copy of the notice enclosed, the public letter says. ...

deloitte hacked

Deloitte Accounting Firm Hacked, Client Information Stolen

The Deloitte accounting firm stands as one of the largest private companies in the US, which reported $38.8 billion in revenue last fiscal year which offers tax, auditing, operations consulting, cybersecurity advisory, and merger and acquisition assistance services to large banks, government agencies, and large Fortune 500 multinationals, among others, has been hacked. ...

phishing emails

The Anatomy of Phishing Emails

Think Before You Click

The Engineering

Before we get into the anatomy of phishing emails, we need to define what social engineering is. For the sake of simplicity, it’s a scam that is created by con artists using the same tricks from decades ago when scams were done on the street and over the phone to now, where it’s conducted over the phone, but predominately through email. ...

when hacked

You’ve Been Hacked – What Should You Do?

Signs You’ve Been Hacked

In today’s threat landscape it is a matter of when hackers will gain access to your computer or cell phone, not if. Proper layers of security keep most of the malware out of your system and when malware does make it on your system the impact is reduced by containment, but none of us live in an ideal world. The indicators that a hacker has gained access are not always apparent and may seem like an annoyance or trivial, but if your computer closely matches the following signs, you might have been hacked. ...

pulse wave

Pulse Wave is a New Technique Using an Old Attack

DDoS

Before we get into the nitty-gritty of how the pulse wave attack behaves, we must first define what a distributed-denial-of-service (DDoS) and denial-of-service (DoS) is, so we are all on the same page. Instead of regurgitating text from resources on the internet I have included a nice quote from Wired.

Simple DoS attacks, performed from a single machine, are uncommon these days. Instead, they’ve been supplanted by DDoS attacks, distributed denial-of-service attacks that come from many computers distributed across the internet, sometimes hundreds or thousands of systems at once. The attacking machines are generally not initiating the assault on their own but are compromised machines that are part of a botnet controlled by hackers who use the machines as an army to target a website or system.

...