ASK QUESTIONS
Tim&Larry

Cyber Checklist of Security Questions to Ask Your Law Firm




Here is the weekly roundup :

Cyber Checklist of Security Questions to Ask Your Law Firm
Law firms are not regulated and only have a contractual and professional obligation to safeguard client information. But they handle the most sensitive, non-public market moving information on the planet.

Banking Trojans Combine to Siphon $4 Million in a Few Days
A new piece of malware has been discovered by security researchers at IBM and has reportedly stolen $4 million from over 24 U.S. and Canadian banks, in a matter of just a few days.

How to Avoid Bad HIPAA Compliance Practices
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was enacted to protect health insurance coverage for employees and their families. HIPAA compliance is an important facet in any healthcare organization. Here, we take a look at some bad practices or missteps that are surprisingly common when dealing with compliance concerns, leaving the door ajar for a possible leak or worse, a data breach.

Apple Co-Founder: Cybercrime is World’s Greatest Threat
Apple co-founder Steve Wozniak believes the attack on cybersecurity is the world’s greatest threat and that cybersecurity is getting “worse and worse year by year, not better and better.”

DHS Wants Windows Users to Uninstall Apple’s Quicktime
Citing security firm Trend Micro, the Department of Homeland Security has issued an alert to Windows users, reminding them that Apple has ended QuickTime support for Windows, leaving them vulnerable to new exploits.

Surveillance Cameras Sold on Amazon Found Infected with Malware
A security researcher has discovered that a set of outdoor surveillance cameras purchased on Amazon was embedded with malware on arrival from Amazon.



Interesting Reading From Around the Web

Hacker Promises To Kill Apple Mac Ransomware Before It Becomes A Nightmare
If you own an Apple Mac, there’s much less chance of your PC being infected with ransomware than if you’re a Microsoft user. Only one fully-functional sample has ever been seen — KeRanger, which infected under 7,000 Apple machines. Not only are there only a handful of examples, two of which were developed as research projects rather than genuine cybercriminal tools, but one professional hacker has developed a tool he believes will successfully prevent any current forms of ransomware infecting Mac OS X.

SpyEye Makers Get 24 Years in Prison
Two hackers convicted of making and selling the infamous SpyEye botnet creation kit were sentenced in Georgia today to a combined 24 years in prison for helping to infect hundreds of thousands of computers with malware and stealing millions from unsuspecting victims.

How the GozNym Trojan Stole Millions
The GozNym hybrid, part banking Trojan and part ransomware, combines features of Nymaim and Gozi ISFB malware to create a powerful Trojan, IBM Executive Security Advisor Limor Kessem said in an IBM alert. GozNym worked like a double-headed beast, where the two codes relied on one another to carry out the malware’s internal operations, he said.


Upcomming Events



LIFARS & Partners
CISO Wine Tasting

New York, NY, April 28
More information

Internet Week Panel
New York, NY, May 17
More information

ASIS NYC
New York, NY, April 27-28
More information

EnFuse 2016
Las Vegas, NV, May 24-26
More information



Featured Q&A:



Ami Rojkes on Today’s Privacy Concerns

Ami Rojkes is an Israeli-based writer with a focus in technology. Ami is currently the Chief Cyber Editor of Israel Defense, an Israeli magazine that covers topics in the Israeli cyber, defense, and the information and communications industries. LIFARS had the privilege of speaking with Ami Rojkes and received an outside view on the security competition in the global community.

Read More




Featured Article



The Global Cyber Crime Underground: What Are They and What Do They Sell?

This is the first blog in a three-part series co-written by LookingGlass Cyber Threat Intelligence Group and LIFARS. The series provides a high level overview of the global cyber crime underground and the biggest players in this space. Today we will be discussing the Chinese underground.

Read Article



Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.