Why are cyberattacks increasingly targeting health care?

Why hospitals? It’s likely because of the massive databases of sensitive personal information they operate, and the importance of daily operations running smoothly.

Hackers are hijacking Windows Search to hit victims with malware | TechRadar

The attack starts with a phishing email pretending to be an invoice, or something similar. It carries a .ZIP archive of an HTML file, and thus successfully bypasses antivirus and email security programs that overlook compressed contents.

VLC Media Player Vulnerabilities Allow Remote Code Execution

This vulnerability could lead to a denial-of-service (DoS) condition on the affected device due to exceeded storage space or arbitrary data.

My family was scammed out of a $15K Carnival Cruise — here’s how I’m fighting to get it back

https://nypost.com/2024/06/13/lifestyle/my-family-was-scammed-out-of-a-15k-carnival-cruise-heres-how-im-fighting-to-get-it-back/

3 reasons users can’t stop making security mistakes — unless you address them | CSO Online

Even with advanced solutions and sophisticated protocols in place, employees continue to inadvertently expose sensitive data and systems to cyber threats. 

Lockdown mode in Android 15 protects your phone from ‘juice jacking’

Affiliate links on Android Authority may earn us a commission. Learn more.

MOBILEANDROID OS

Lockdown mode in Android 15 protects your phone from ‘juice jacking’

These covert attacks could soon be a thing of the past.

By Mishaal Rahman

9 hours ago

Mishaal Rahman / Android Authority

TL;DR

Android 15 is adding a built-in mechanism to protect your device from “juice jacking” attacks.

Charging will be allowed when lockdown mode is enabled in Android 15, but USB data access will not.

Juice jacking is a largely theoretical problem you don’t really need to worry about, but it’s still nice that Android will protect you against it.

You may have heard of a problem called “juice jacking” recently. It’s a hacking method that involves secretly sending data payloads from a USB cable that you think is only charging your device. These data payloads can theoretically compromise your device or cause it to take some action unbeknownst to you. However, in reality, the threat of juice jacking is so minimal to almost be ignorable, but if you’re still wary of public charging stations, Android 15 has you covered.

Juice jacking takes advantage of the fact that most devices don’t block USB data signaling, i.e., data being transferred over USB, by default. That means that, while on the surface, a USB cable you plug your phone into might seem innocuous, in reality it might be attempting to send some payload to commandeer your device.

Massachusetts town loses $445,000 in email scam | StateScoop

According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.

Rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that | CNN Business

The nation’s roughly 1,800 rural community hospitals are among the most vulnerable to dangerous ransomware attacks because they often lack IT security resources and cybersecurity-trained staff.

8 Best PuTTY Alternatives for SSH Client Connections

PuTTY is just like the translator that bridges the information gap. This software is a handy tool when it comes to establishing an SSH client connection path, which is eventually necessary for file transfers and system management.

Malicious VSCode extensions with millions of installs discovered

Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.