Change Healthcare confirms the customer data stolen in ransomware attack

0
[ad_1]

For the first time since news broke about a ransomware attack on Change Healthcare, the company has released details about the data stolen during the attack.

First, a quick refresher: On February 21, 2024, Change Healthcare experienced serious system outages due to a cyberattack. The incident led to widespread billing outages, as well as disruptions at pharmacies across the United States. Patients were left facing enormous pharmacy bills, small medical providers teetered on the edge of insolvency, and the government scrambled to keep the money flowing and the lights on. The ransomware group ALPHV claimed responsibility for the attack.

But shortly after, the ALPHV group disappeared in an unconvincing exit scam designed to make it look as if the FBI had seized control over the group’s website. Then a new ransomware group, RansomHub, listed the organization as a victim on its dark web leak site, saying it possessed 4 TB of “highly selective data,” relating to “all Change Health clients that have sensitive data being processed by the company.”

In April, parent company UnitedHealth Group released an update, saying:

“Based on initial targeted data sampling to date, the company has found files containing protected health information (PHI) or personally identifiable information (PII), which could cover a substantial proportion of people in America.”

Now, Change Healthcare has detailed the types of medical and patient data that was stolen. Although Change cannot provide exact details for every individual, the exposed information may include:

  • Contact information: Names, addresses, dates of birth, phone numbers, and email addresses.
  • Health insurance information: Details about primary, secondary, or other health plans/policies, insurance companies, member/group ID numbers, and Medicaid-Medicare-government payor ID numbers.
  • Health information: Medical record numbers, providers, diagnoses, medicines, test results, images, and details of care and treatment.
  • Billing, claims, and payment information: Claim numbers, account numbers, billing codes, payment card details, financial and banking information, payments made, and balances due.
  • Other personal information: Social Security numbers, driver’s license or state ID numbers, and passport numbers.

Change Healthcare added:

“The information that may have been involved will not be the same for every impacted individual. To date, we have not yet seen full medical histories appear in the data review.”

Change Healthcare says it will send written letters—as long as it has a person’s address and they haven’t opted out of notifications—once it has concluded the data review.

Protecting yourself after a data breach

There are some actions you can take if you are, or suspect you may have been, the victim of a data breach.

  • Check the vendor’s advice. Every breach is different, so check with the vendor to find out what’s happened, and follow any specific advice they offer.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for fake vendors. The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.
  • Set up identity monitoring. Identity monitoring alerts you if your personal information is found being traded illegally online, and helps you recover after.

Malwarebytes has a new free tool for you to check how much of your personal data has been exposed online. Submit your email address (it’s best to give the one you most frequently use) to our free Digital Footprint scan and we’ll give you a report and recommendations.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection.


[ad_2]
Source link

TikTok’s AI avatars could briefly make problematic content

0
[ad_1]

We’re in a world where it’s getting harder to believe what we see on the internet. The advent of AI avatars is making this worse. TikTok is testing something like this, but it might have hit a bump. TikTok’s AI avatars could briefly make problematic content.

The ByteDance-owned company was swift to jump on the AI bandwagon and bring its own AI tools. Now, the company is working on its Symphony Avatars. These are AI-generated avatars that are meant to give you the illusion that they’re actual people. As if it wasn’t hard enough to believe what you see on TikTok already. Right now, the tool is still in testing with a limited number of users.

TikTok’s AI avatars briefly made problematic content

This issue was first seen by CNN reporter Jon Sarlin. He was able to gain access to the tool using their personal account. That was the first clue that something was askew. This test is supposed to be limited to an exclusive group of users. So, common users shouldn’t have access to it.

No guardrails

The rabbit hole gets deeper, as the user saw that the videos produced weren’t watermarked. AI companies are encouraged to have some sort of watermarking system in place to let people know when content is AI-generated. This way, people won’t be deceived when they view the content.

Reciting terrible text

For the cherry on top of this problematic sundae, TikTok’s Ai avatars were able to make some rather questionable content. The reporter was able to get an avatar to recite Hitler’s “Mein Kampf” and Osama bin Laden’s “Letter to America”. In case you don’t know, those are pretty bad things to recite.

So, there were no guardrails on what could be produced and no way to tell that it’s fake. It looks like TikTok is in hot water, right? Well, not really. Again, this feature isn’t publicly available. The company said that a “technical error” made the pre-production feature accessible to some common users. Also, the problematic content wasn’t posted to the actual app. It appears that it only made it to the preview stage.

According to a statement from the company, “If CNN had attempted to upload the harmful content it created, this content would have been rejected for violating our policies.” So, it appears that it wouldn’t have been much of an issue.

TikTok has pulled access to common accounts and is working on making sure that the feature doesn’t produce videos that would get anyone canceled. So, when this feature does launch, it will hopefully be safer.


[ad_2]
Source link

LockBit Ransomware Group Claims Hack of US Federal Reserve

0
[ad_1]

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve, allegedly compromising 33 terabytes of sensitive data.

The announcement was made on Twitter via the group’s Dark Web Intelligence, sending shockwaves through financial and governmental sectors.

Details of the Breach

LockBit 3.0, the latest iteration of the ransomware group, declared that it had infiltrated the Federal Reserve’s systems, exfiltrating a vast amount of confidential banking information.

The stolen data reportedly includes sensitive details about American banking activities, which, if verified, could represent one of the most substantial financial data breaches in history.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

The group has given the Federal Reserve 48 hours to hire a new negotiator and dismiss the current one, whom they disparagingly called a “clinical idiot” for valuing American banking secrecy at $50,000.

The potential fallout from this breach is immense.

Exposure to such a vast amount of sensitive information could have dire consequences for individual privacy, financial stability, and national security.

The Federal Reserve, responsible for overseeing the nation’s monetary policy, regulating banks, and maintaining financial stability, is a critical component of the U.S. financial infrastructure.

Financial institutions, cybersecurity experts, and government agencies are undoubtedly on high alert.

An attack of this magnitude underscores the vulnerabilities within even the most secure and vital systems.

Response and Implications

The Federal Reserve has not publicly confirmed the breach or provided details about the ongoing response efforts.

However, federal agencies, including the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), are expected to be actively involved in addressing the situation.

Public assurance measures will likely be a priority to maintain confidence in the financial system.

This incident highlights the urgent need for enhanced cybersecurity strategies and international cooperation to combat ransomware and protect critical infrastructure from future attacks.

The alleged cyberattack by LockBit 3.0 on the Federal Reserve is a wake-up call for all sectors reliant on digital infrastructure.

As the situation develops, monitoring the Federal Reserve’s response, the effectiveness of federal cybersecurity measures, and the broader implications for national security and financial stability will be crucial.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free


[ad_2]
Source link

Samsung’s Galaxy S24 Ultra now shines in this color globally

0
[ad_1]

Last week, Samsung hinted at a new color variant of the Galaxy S24 Ultra. It somewhat cryptically teased a yellow color option for the latest flagship in India. We presumed it to be the Titanium Yellow color, which is already available in most other markets. It indeed was that, as the company has officially announced the new colorway for the phone in the country.

Samsung launches Titanium Yellow Galaxy S24 Ultra in more markets

Samsung usually offers its Galaxy S series flagship smartphones in a wide range of colors so everyone gets something of their choice. It is no different this year. The Galaxy S24 Ultra comes in as many as seven colorways. These included Titanium Violet, Titanium Yellow, Titanium Gray, and Titanium Black as the standard color options that you can pick up from any retailer, including Samsung itself.

The Titanium Green, Titanium Blue, and Titanium Orange colors, meanwhile, are exclusively sold through the Korean firm’s online store. You won’t find these options on third-party retailers. This is also standard Samsung stuff—the company always keeps some colors exclusive to its store—so nothing surprising. However, it surprisingly didn’t bring the Titanium Yellow color to some markets.

For example, in India, Galaxy S24 Ultra buyers had only three standard colors to choose from alongside the three Samsung-exclusive ones. That’s changing with the launch of the Titanium Yellow variant. The company is now selling all seven colors of the phones in the country. As said earlier, the yellow option is already available in most other markets, including Australia, Europe, the US, the UK, and the UAE.

Samsung Galaxy S24 Ultra Titanium Yellow

The Titanium Yellow Galaxy S24 Ultra costs the same as other colors in India. In fact, switching colors doesn’t affect the price of the phone anywhere. The latest Samsung flagship starts at ₹129,999 (for the 12GB+256GB variant), which is about $1,560 in the current currency exchange rate. That’s because flagship smartphones are usually costly in India. The same phone costs $1299.99 in the US.

Samsung is gearing up for another major launch next month

Samsung may soon bring the Titanium Yellow Galaxy S24 Ultra to other markets where it wasn’t available initially. However, another product will soon be the center of attraction in the Galaxy family. The company is gearing up to launch the Galaxy Z Fold 6 and Galaxy Z Flip 6 foldables. The launch event may take place on July 10, with Samsung also unveiling new watches, earbuds, and other products.


[ad_2]
Source link

Apple considered Meta to help with Apple Intelligence

0
[ad_1]

Apple shook the world when it announced Apple Intelligence, and we’re still feeling the aftershocks. We all know that Apple tapped OpenAI to aid its online-based AI. However, a new report states that Apple also considered Meta as a potential AI partner.

During WWDC 2024, Apple showed off its specific vision for artificial intelligence. Named Apple Intelligence, it basically gives your iPhone a 200-point IQ. During the event, Apple also announced that it partnered with OpenAI to give users access to GPT-4o for online-based AI. So anything that Apple Intelligence isn’t intelligent enough to complete will be sent to the cloud to be processed.

While Apple eventually shook hands with OpenAI, it was also in talks with Google about much the same thing. However, recent reports state that Apple is still open to the idea of partnering with Google to give people access to more models.

Apple was in talks with Meta about implementing its AI

Raise your hand if you’re surprised that Apple is being so open-minded about its AI. Let’s be honest, Apple isn’t quite the best company when it comes to offering choices. So, it’s a little surprising that Apple wants to provide so many options for AI models. We’ll just have to see how open it is once it completes its own models.

In any case, a new report from the Wall Street Journal states that Apple was also in talks with Meta about using its models to help its AI. If so, then iPhones would most likely reach out to the company’s Llama 3 model. This is what’s powering the AI tools found across Meta’s products.

Just like with Google, we’re not sure if Apple will eventually make Meta’s AI an additional option along with GPT-4o. If so, then people will not be starved for options. What makes this better is the fact that Apple also tapped companies like Anthropic and Perplexity for much the same thing.

If so, then the iPhone could be a hub to access different AI models. That will benefit users all around the world who want to have access to multiple models.

Right now, this is still early information, so you’ll want to take this news with a grain of salt. Apple is still new to the AI game, so everything is still up in the air.


[ad_2]
Source link

Apple faces $38 billion fine after EC makes preliminary ruling on DMA violations

0
[ad_1]
A bit more than a week ago we told you that the European Commission (EC) was investigating whether it should charge Apple with violating its Digital Markets Act (DMA). The DMA is the legislative act that forced Apple to make changes to the iPhone in the EU’s 27 member countries. These changes allow iPhone users to sideload apps from third-party app stores, and use third-party browsers that run on non-WebKit engines. The DMA also allows developers to give consumers the option to make in-app payments using third-party payment platforms instead of being forced to pay through Apple’s platform which generates a commission for the tech giant.
A press release disseminated Monday morning from the EC says, “The European Commission has informed Apple of its preliminary view that its App Store rules are in breach of the Digital Markets Act (DMA), as they prevent app developers from freely steering consumers to alternative channels for offers and content. In addition, the Commission opened a new non-compliance procedure against Apple over concerns that its new contractual requirements for third-party app developers and app stores, including Apple’s new Core Technology Fee (CTF), fall short of ensuring effective compliance with Apple’s obligations under the DMA.”

What is the Core Technology Fee?

The Core Technology Fee is charged to developers who decide to be governed by Apple’s new App Store rules in the 27 EU countries. These new rules allow developers to offer consumers the ability to make in-app payments through alternative payment processors in the EU. The Core Technology Fee charges developers €0.50 (valued at approximately 54 U.S. cents) for each annual install over one million.

Smaller developers are protected from paying the Core Technology Fee. According to Apple, “Developers whose apps do not surpass one million first annual installs per year and nonprofits, educational institutions, and government entities with an Apple Developer Program fee waiver do not pay the CTF. The CTF is also not required for developers with a no revenue business that offer free apps without monetization. Additionally, small developers (earning less than €10 million in global business revenue) are provided with a 3-year free on-ramp to the CTF and won’t pay the CTF for first annual installs that exceed the threshold within a 3-year period.”

If developers in the EU who qualify for paying the CTF want to avoid it, they can continue to follow the old rules and have in-app payments directed to Apple’s payment processing platform. If a developer favors that route, they will have to pay Apple a commission equaling 10%-17% of the value of the transaction.

Besides the CTF, the EC is concerned about the number of steps an iPhone user has to take in order to install an alternative app storefront or install an app from a third-party app store. The EC will also investigate the eligibility requirements that Apple has for developers allowing them to offer alternative app stores or distribute apps from the web on the iPhone. The issue is whether some of Apple’s requirements comply with the DMA.

The EC says that if its preliminary findings hold, Apple would be found not to be in compliance with Article 5(4) of the DMA “which requires gatekeepers to allow app developers to steer consumers to offers outside the gatekeepers’ app stores, free of charge.” 

When will the EC reach a decision and how much can Apple be fined?

If Apple is found to have breached the DMA, it could be subject to a fine no higher than 10% of its global revenue which was $383 billion in the last fiscal year. Repeat offenders can be charged up to 20% of their annual revenue. A decision on Apple’s compliance with the DMA will be made on or before March 25th, 2025.

In a statement, Apple said, “Throughout the past several months, Apple has made a number of changes to comply with the DMA in response to feedback from developers and the European Commission. We are confident our plan complies with the law, and estimate more than 99% of developers would pay the same or less in fees to Apple under the new business terms we created. “

The tech giant continued by saying, “All developers doing business in the EU on the App Store have the opportunity to utilize the capabilities that we have introduced, including the ability to direct app users to the web to complete purchases at a very competitive rate. As we have done routinely, we will continue to listen and engage with the European Commission.”


[ad_2]
Source link

Malware Campaign Targets F5 BIG-IP Appliances To Steal Data

0
[ad_1]

Researchers discovered a malware campaign targeting F5 BIG-IP appliances that could remain hidden for years. The threat actors behind the malware aim to steal data while evading detection, which can severely impact victim organizations.

Outdated F5 BIG-IP Appliances Could Remain Under Malware Attack Undetected For Years

According to a recent post from Sygnia, their researchers detected malware intrusion on an organization following a cyber attack. Investigating the matter made them unveil a sneaky malware campaign that remained undetected for a couple of years.

Specifically, the malware campaign linked back to a China-nexus threat actor “Velvet Ant” that managed to infiltrate the target network by compromising F5 BIG-IP appliances. Using this custom malware allowed the attackers to evade detection for at least two years before catching Sygnia’s attention.

As observed, the victim organization had two vulnerable F5 BIG-IP appliances on its network for firewall, WAF, load balancing, and local traffic management services. Moreover, both devices remained exposed to the internet instead of being protected via the company firewall. Consequently, the threat actors possibly exploited known vulnerabilities in those devices, gaining remote access to the network.

After establishing persistence, the threat actors deployed various binaries on the network to execute malicious activities and steal data.

The researchers have shared a detailed technical analysis of the entire malware attack in their post. However, how exactly the threat actors compromised the vulnerable devices remains unclear.

While the researchers have described the single event in detail, they suspect this might be a part of a widespread cyberespionage campaign from the threat actors. Therefore, they advise organizations to implement robust security measures to prevent threats.

Some key steps that firms should deploy on their networks include limiting outbound internet traffic and deploying firewalls to protect internet-facing devices, limiting traffic over management ports to prevent lateral movement, replacing legacy systems, and deploying Endpoint Detection and Response (EDR) systems for adequate monitoring.

Let us know your thoughts in the comments.


[ad_2]
Source link

How Android’s security features safeguard your mobile app experience

0
[ad_1]

Android remains at the forefront of cybersecurity, deploying a suite of security features tailored to protect its users. Emphasizing user control and data integrity, Android’s security architecture is built on a foundation of app permissions, biometric technologies, and continuous updates. These layers of protection ensure that personal information remains secure and that the functionality of devices is not compromised, even as potential security threats grow in complexity and number.

App Permissions

Android’s approach to app permissions is designed to give you complete control over what personal information and device functions each app can access. This system ensures that no app can access your camera, contacts, GPS location, or storage without asking you first.

For example, if you download a mobile casino app, it might ask for permission to use your device’s GPS to provide location-based services or to access your device’s storage to save game data. Android makes sure that you see a prompt asking if you agree to these requests, and the app can make no changes or access any data unless the user allows this.

Android has also introduced new features that give you even more control, like one-time permissions and auto-reset. One-time permissions mean an app can only access certain data like your location while it’s being used. If an app hasn’t been used for a while, auto-reset will turn off permissions automatically.

Google Play Protect

This integral feature operates by continuously scanning all apps on the Google Play Store prior to their download, certifying that they are devoid of any malicious software or vulnerabilities.

Beyond just initial app reviews, Google Play Protect remains active in the background of your device, persistently monitoring for any unusual behaviors or updates from installed apps that could indicate a security risk. Its real-time protection capabilities are designed to quickly identify and neutralize threats without waiting for user intervention.

Biometric Security Features

Today, Android devices are equipped with sophisticated biometric systems that include fingerprint scanning, facial recognition, and iris scanning, each providing a secure method to verify a user’s identity.

Fingerprint scanning on Android devices captures the unique patterns of ridges and valleys on a user’s fingertip. When access is attempted, the device compares the presented fingerprint with the stored data.

Facial recognition technology in Android uses complex algorithms to map the user’s facial features. This system analyzes numerous points on the face, such as the eyes, nose, and mouth, to create a detailed biometric profile.

Iris scanning, another advanced feature available on some Android devices, utilizes an infrared camera to capture the intricate patterns of the user’s iris. Like other biometric data, this information is encrypted and stored on the device. During authentication, the device scans the iris and compares it to the stored pattern to verify the user’s identity.

Sandboxing

This security mechanism works by creating an isolated environment, a sandbox, for each application on the device. Within this sandbox, the app’s processes are executed separately from the system’s core processes and other applications.

The main benefit of sandboxing is its ability to contain any potential damage caused by malicious software. For instance, if an app is downloaded and later found to be infected with malware, the effects of this malicious app are confined to its own sandbox. This containment prevents the malware from spreading to other parts of the system or accessing sensitive information from other apps.


[ad_2]
Source link

Beats has some new headphones, and they’re pretty awesome

0
[ad_1]

We should all be familiar with the Beats line of premium audio gear. It made a name for itself back in 2011, and it’s looking to do it all over again in 2024. The company just launched the new Beats Solo 4 series of headphones and Solo Buds.

It’s Beats season, as the Apple-owned brand is launching its latest and greatest devices. Not too long ago, we got word about the company preparing to launch a new Beats Pill. This one will share some design attributes with previous iterations, but it’ll still come with some defining features. Right now, we’re still waiting for information about this new speaker. What we know is that it’s going to be a powerful device that you can take pretty much anywhere.

Beats unveil the new Beats Solo 4 and Solo Buds

Starting off with the buds, this isn’t Beats’ first round of TWS earbuds, but they do stand out. The company has a line of earbuds called the Studio Buds. Those are designed to be premium, and they have a price to show.

The Solo Buds, on the other hand, bring power down to a more affordable price point. Coming in at only $79.99, these are targeted to the mid-range audio market. Also, this makes them the cheapest Beats on the market. While they’re affordable, they still offer a great audio experience.

Each earbud has a dual-layer driver which the company says minimizes the micro-distortions in the audio. The result is an overall more accurate sound. Those drivers are axel-aligned to be parallel to the nozzle. This delivers the audio directly to your ears.

The Solo Buds support both Android and iOS, and they’re also compatible with both the Find My Device network and Apple’s Find My network. They can last up to 18 hours on a single charge but your mileage will vary. To get that 18-hour figure, the Solo Buds were tested at 50% volume and streamed audio at 256-Kbps with AAC encoding.

The Solo Buds come in Matte Black, Arctic Purple, Transparent Red, and Storm Gray. You can order them from the official Beats website today.

Beats Solo 4

Moving on to bigger fish, the Beats Solo 4 are the company’s newest flagship headphones. They come in at $199.99, and they’re worth every dime. Since these are the latest headphones from the company, they’re better in just about every way.

The Solo 4 come with updated 40mm drivers. They’re designed to minimize electronic artifacts, distortion, and latency. You’re getting the best and highest-detailed sound from any Beats product.

Adding to this experience is the spatial audio. These headphones have dynamic head tracking that makes you feel like you’re in the middle of the action.

These are Bluetooth headphones, but what if you’re an audiophile? You’re covered too. Bluetooth audio is compressed, but if you want to listen to uncompressed (lossless) audio, you can use them in wired mode with a USB-C cord. Listening to services like Apple Music or Tidal will be a treat.

If you’re using them in Bluetooth mode, you can expect up to 50 hours of listening time on a single charge. Just like with the Solo Buds, the Solo 4 were tested at 50% volume listening to music at 256-Kbps with AAC encoding.

The Solo 4 are available to buy, so you can pick up a pair today.


[ad_2]
Source link

Google brings brings Gemini AI to teen students in over 100 countries

0
[ad_1]

Image credit — Google

Google is bringing its AI chatbot, Gemini, to teen students in over 100 countries. This was announced today by the company in a blog post where it outlined how Gemini will make learning more personal and engaging for students and how it will be available for free to schools.

The company stated in its announcement that it has partnered with experts in child safety and development to ensure that Gemini is used responsibly in schools. As far as how it will help students learn, an example given is how students can chat with Gemini to get help with their homework or to learn more about a topic they’re interested in. Gemini can also provide personalized feedback on students’ work and help them identify areas where they need to improve. For instance, if a student is writing a paper, Gemini can help them to improve their grammar, spelling, and clarity of writing. Overall, Gemini can be a valuable tool for students who want to learn more and improve their academic performance.

Video Thumbnail

The above video is what will be shown to students when they’re first given access to Gemini, teaching them how to use it responsibly

In addition to Gemini, Google is also adding a number of other AI-powered tools to Chromebooks and Google Workspace for Education. These tools include Read Along in Classroom, which helps students improve their reading skills; Google Classroom, which makes it easier for teachers to create and deliver lessons; and Google Vids, which helps students create engaging videos. Here are some of the key features of Google’s new AI-powered tools for education:

  • Gemini: Chatbot that can help students learn in a variety of ways.
  • Read Along in Classroom: Helps students improve their reading skills.
  • Google Classroom: Makes it easier for teachers to create and deliver lessons.
  • Google Vids: Helps students create engaging videos.
  • Media literacy curriculum: Helps students learn how to navigate the internet safely and responsibly.

An example of how Gemini will help users in the classroom

Google says it is also committed to helping students stay safe online. As a result, the company has developed a new media literacy curriculum, in partnership with leading experts like the National Association of Media Literacy Education (NAMLE), that helps students learn how to navigate the internet safely and responsibly. This curriculum covers a wide range of topics, including how to identify credible sources of information, how to avoid online scams, and how to be respectful of others online.

Google’s new AI-powered tools for education are a promising step forward in the use of technology to improve learning, and have the potential to make a real difference in the lives of students around the world. It is kind of amazing how much information is available to students now right at their fingerprints. The only challenge now is to ensure that these tools are used properly and fairly.


[ad_2]
Source link