Related By Tag: hacker investigation

Chicago Election Judges Received Misinformation Calls

How could this have happened? The media has been reporting instances of Republican election judges receiving telephone calls misinforming them that their service was not needed on election day or that further training in remote far away places was required in order to participate as an election judge in Cook County Illinois. The Chicago Cook[…Read More]

Community Health Services Data Breached By Hackers

More than 4.5 Million patient records were compromised by a data breach disclosed this week by Community Health Systems, which operates 9 hospitals in Illinois.  Three of the impacted hospitals in the Chicago area included Metro South Medical Center in Blue Island, Vista Medical Center and Vista Medical Center West in Waukegan. According to the[…Read More]

Chicago Yacht Club Reports Credit and Bank Account Security Breach

Chicago Yacht Club computer was reportedly compromised by Malware that exposed bank account and credit card information to rogue hackers Forensicon was provided a copy of this letter sent to certain members of the Chicago Yacht Club.   Anyone who has conducted financial transactions with the Chicago Yacht Club in the last few years should[…Read More]

Data for Millions Stolen after Adobe is Hacked

Last October, the software giant Adobe suffered a massive security breach which compromised the sensitive data of nearly three million customers. Later in October, further compromise of Adobe’s databases resulted in this number growing to more than 150 Millions names and encrypted passwords. Some of the compromised accounts included more than a quarter million governmental[…Read More]

What is Two-Factor Authentication?

What is Two-Factor Authentication?  Two-factor authentication requires a user that is logging onto a computer network or cloud service Internet provider, to have more than one means of proving who they are. Ergo, simply knowing a single password that you can remember won’t provide access without having a second factor to prove your identity. Two-Factor[…Read More]

Millions of Data Breaches: How Can You Protect Your Data?

Since 2005, there have been a staggering 535,267,233 records of data breaches by various means in the United States alone. What is even scarier is that this number may be significantly higher, since many data breaches that have occurred are not reported. Identity theft is at an all-time high and government agencies and security companies[…Read More]

Largest Banks in the U.S. Under Attack from “Project Blitzkrieg”

The McAfee security firm confirmed that there is a major cyber attack being launched against the largest banks in the United States.  The banks included are Citibank, Chase, Wells Fargo, PayPal, among others. This attack is scheduled to occur in the Spring of 2013.  The attack is called “Project Blitzkrieg” and according to  reports, is[…Read More]

Most Used Passwords of 2012

This year has seen its fair share of corporate security breaches and hacker attacks. Some of the most notable include Global Payments, Yahoo!, LinkedIn and the University of Nebraska. While these organizations continue to investigate and install safeguards to limit future attacks, users are left scrambling to understand if their accounts have been compromised and[…Read More]

What To Do If Your Information Has Been Compromised

If your information was compromised in the Board of Election security breach, you should immediately place a fraud alert on your credit reports and review your credit reports. TransUnion 1-800-680-7289 Fraud Victim Assistance Division P.O. Box 6790, Fullerton, CA 92834-6790 Equifax 1-800-525-6285 P.O. Box 740241, Atlanta, GA 30374-0241 Experian 1-888-EXPERIAN (397-3742) P.O.[…Read More]

2013 Computer Forensics and CyBit Show

The 2013 Computer Forensics and CyBit Show will take place on May 8-9, 2013 at the Jacob Javits Center in New York City, co-located with The ASIS Security Show.  Through comprehensive conferences and exhibits, this year’s show will feature the latest in technological advances and changes in the IT security market.  It will also provide[…Read More]