Joseph Cox reports: Last week, Motherboard reported that a vigilante hacker had stolen data from a hacking group that researchers say is a government-linked cyberespionage unit. The data included GPS locations, text messages, and phone calls that the group had taken from their own victims. Now, that hacker has seemingly published the stolen data online…
Month: May 2018
UT physician group improperly shared patient email addresses
Todd Ackerman reports: A clinic owned by the physicians organization of the University of Texas Health Science Center at Houston improperly sent out mass emails containing the email addresses of many of its patients. UT Physicians’ Davis Clinic sent batches of emails, notification of a doctor leaving the clinic, to patients last week. There were…
Gadsden High students accused of changing grades, cannot graduate
KVIA reports: A total of 55 students from Gadsden High School are accused of accessing an online computer program and changing their grades on their online courses. The school said students in various upper grade levels gained access to the access code that allowed them to change the grade of their work on curriculum software…
More than 200,000 patients’ records were exposed on MedEvolve’s public FTP server – researcher
Common sense dictates that patients’ protected health information should not be made freely available on FTP servers that have no login required. And yet it still happens, and has happened again. Recently, this site learned of another FTP server exposing patients’ information. This particular FTP server belongs to MedEvolve, an Arkansas company that provides practice management…
Ex-CIA employee ID’d but not charged in Vault 7 leak of hacking tools
It’s the leak/spy story of the year, I think. But no one has been charged as yet, even though they have a suspect. Dan Goodin reports: Federal authorities have identified a suspect behind last year’s Vault 7 leak of Central Intelligence Agency hacking tools. The trove published to WikiLeaks included exploits and documents for infecting…
Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers
Catalin Cimpanu reports: An unidentified hacker group appears to have accidentally exposed two fully-working zero-days when they’ve uploaded a weaponized PDF file to a public malware scanning engine. The zero-days where spotted by security researchers from Slovak antivirus vendor ESET, who reported the issues to Adobe and Microsoft, which in turn, had them patched within…