<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>hacking &#8211; CalWatchdog.com</title>
	<atom:link href="https://calwatchdog.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com</link>
	<description></description>
	<lastBuildDate>Tue, 01 Mar 2016 01:18:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">43098748</site>	<item>
		<title>L.A. hospital pays ransom to regain control of computer system from hackers</title>
		<link>https://calwatchdog.com/2016/03/01/l-a-hospital-hack-has-ca-on-edge/</link>
					<comments>https://calwatchdog.com/2016/03/01/l-a-hospital-hack-has-ca-on-edge/#comments</comments>
		
		<dc:creator><![CDATA[James Poulos]]></dc:creator>
		<pubDate>Tue, 01 Mar 2016 13:05:32 +0000</pubDate>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Robert Hertzberg]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hospitals]]></category>
		<category><![CDATA[health care]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=86998</guid>

					<description><![CDATA[Announcing its data had been taken hostage by hackers, Hollywood Presbyterian Medical Center got its information back but triggered a new wave of fears that so-called &#8220;ransomware&#8221; attacks pose a serious threat]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignright  wp-image-87011" src="http://calwatchdog.com/wp-content/uploads/2016/02/hollywoodpresbyterian2hitn.png" alt="hollywoodpresbyterian2hitn" width="511" height="287" srcset="https://calwatchdog.com/wp-content/uploads/2016/02/hollywoodpresbyterian2hitn.png 712w, https://calwatchdog.com/wp-content/uploads/2016/02/hollywoodpresbyterian2hitn-300x169.png 300w" sizes="(max-width: 511px) 100vw, 511px" />Announcing its data had been taken hostage by hackers, Hollywood Presbyterian Medical Center got its information back but triggered a new wave of fears that so-called &#8220;ransomware&#8221; attacks pose a serious threat to the health care industry in California and beyond.</p>
<p>&#8220;While it was not the first hacked organization to acquiesce to attackers&#8217; demands, the California hospital that paid $17,000 in ransom to hackers to regain control of its computer system was unusual in one notable way: It went public with the news,&#8221; Reuters reported.</p>
<p>Until the hospital coughed up the sum, several of its key and core functions were effectively paralyzed. &#8220;The facility was without access to email, digital patient records and some internet-connected medical devices for nearly two weeks, from Feb. 5 to 17,&#8221; <a href="http://www.cbc.ca/news/technology/hollywood-hospital-hack-ransomware-trends-1.3462062" target="_blank" rel="noopener">according</a> to CBC.</p>
<p>&#8220;It’s no different than if they took all the patients and held them in one room at gunpoint,&#8221; insisted state Sen. Robert Hertzberg, D-Van Nuys, Reuters reported. Hertzberg has introduced legislation &#8220;to make a ransomware attack equivalent to extortion and punishable by up to four years in prison.&#8221;</p>
<p>Health care hacks have spiked in recent months. &#8220;The health care industry isn&#8217;t just a top target for ransomware attacks,&#8221; CBC noted. &#8220;According to a report by security firm Trend Micro, 30 percent of identity theft-related cybercrime activity targeted health care from 2005 to 2015.&#8221;</p>
<p>Just this year, the San Francisco Chronicle <a href="http://www.sfchronicle.com/business/article/Hospital-hack-reveals-digital-risk-in-medical-6834978.php" target="_blank" rel="noopener">reported</a>, four hospitals including HPMC were hit. &#8220;Though there are no recorded patient injuries or deaths tied to cyberattacks, digital security in hospitals, and, perhaps, more importantly in medical devices such as pacemakers and MRI machines, has become a growing concern in the industry,&#8221; the paper added.</p>
<h3>Limited measures</h3>
<p>The Food and Drug Administration has struggled to stay ahead of the risk curve. Hospitals not only have traditional online networks to worry about; their myriad of networked devices provide hackers with a wealth of potential targets and entry points into databases. &#8220;Last summer, the FDA and Department of Homeland Security issued a warning to hospitals about a drug-infusion system with a flaw so serious that it could give hackers entree into the devices,&#8221; according to the Chronicle. &#8220;Just last month, the FDA issued draft guidance for medical device manufacturers to begin administering their own vulnerability disclosure programs — allowing outside researchers to easily flag weaknesses.&#8221;</p>
<p>But the HPMC attack underscored the limited power of regulations and bureaucracies to police the front line of defense for companies targeted by hackers: staff education. &#8220;According to <i>CSO</i>, the incident was random, likely meaning a hospital staffer clicked a malicious link or attachment that ultimately spread the malware throughout the network,&#8221; The Verge <a href="http://www.theverge.com/2016/2/15/11004794/california-ransomware-hospital" target="_blank" rel="noopener">observed</a>.</p>
<h3>Planning for attacks</h3>
<p>Because hackers predominantly play a numbers game, casting a wide net instead of focusing from the outset on a specific target, hospitals have wound up being targeted simply in virtue of being large, often unwieldy organizations that can&#8217;t afford to be crippled for very long. &#8220;Mostly, hacks start with mass email campaigns aiming to snare unwitting recipients. Hospitals, police agencies and other essential services fall victim because employees who have access to those networks are often busy, IT staffs are underfunded, and cybersecurity training is rare,&#8221; <a href="http://www.ibtimes.com/ransomware-hackers-bigger-threat-ever-forcing-hospitals-police-pay-hostage-fees-2319822" target="_blank" rel="noopener">according</a> to the International Business Times.</p>
<p>While organizations must stop or prevent every attempted breach of their network to prevail over attackers, hackers themselves often only need to breach once in order to seize data they can exfiltrate or hold for ransom. For that reason, experts have counseled that the best defense is one that expects breaches to occur and creates strategies to deal with them. &#8220;Ransomware strains are becoming increasingly complex and impossible to contain. The best way to avoid an infection is to plan on being infected anyway,&#8221; as IBT noted. &#8220;The only catch-all way to mitigate the damage is regular data backups, in the form of either cloud storage or a physical hard drive.&#8221;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2016/03/01/l-a-hospital-hack-has-ca-on-edge/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">86998</post-id>	</item>
		<item>
		<title>More than 100,000 households&#8217; tax data stolen through IRS website</title>
		<link>https://calwatchdog.com/2015/05/28/more-than-100000-households-tax-data-stolen-through-irs-website/</link>
		
		<dc:creator><![CDATA[Josephine Djuhana]]></dc:creator>
		<pubDate>Thu, 28 May 2015 15:10:22 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[IRS]]></category>
		<category><![CDATA[Social Security]]></category>
		<category><![CDATA[tax refund]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[Internal Revenue Service]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=80352</guid>

					<description><![CDATA[The Internal Revenue Service announced Tuesday that identity thieves &#8220;used taxpayer-specific data acquired from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through IRS&#8217; &#8216;Get Transcript&#8217; application.&#8221;]]></description>
										<content:encoded><![CDATA[<p><a href="http://calwatchdog.com/wp-content/uploads/2015/05/irs.jpg"><img decoding="async" class="alignright size-medium wp-image-80354" src="http://calwatchdog.com/wp-content/uploads/2015/05/irs-300x110.jpg" alt="irs" width="300" height="110" /></a>The Internal Revenue Service announced Tuesday that identity thieves &#8220;used taxpayer-specific data acquired from non-IRS sources to gain unauthorized access to information on approximately 100,000 tax accounts through IRS&#8217; &#8216;Get Transcript&#8217; application.&#8221;</p>
<p>Data acquired illegally, such as Social Security information, date of birth or street address, could be used to clear the IRS&#8217; &#8220;multi-step authentication process,&#8221; rendering most of those safety precautions useless. With this data, the IRS said, criminals were able to file fraudulent tax refunds.</p>
<p>According to the statement:</p>
<blockquote><p>&#8220;The matter is under review by the Treasury Inspector General for Tax Administration as well as the IRS’ Criminal Investigation unit, and the &#8216;Get Transcript&#8217; application has been shut down temporarily.</p></blockquote>
<p>In addition to disabling the &#8220;Get Transcript&#8221; application, the IRS has taken the below steps:</p>
<ul>
<li class="first-child">&#8220;Sending a letter to all of the approximately 200,000 taxpayers whose accounts had attempted unauthorized accesses, notifying them that third parties appear to have had access to taxpayer Social Security numbers and additional personal financial information from a non-IRS source before attempting to access the IRS transcript application. Although half of this group did not actually have their transcript account accessed because the third parties failed the authentication tests, the IRS is still taking an additional protective step to alert taxpayers. That’s because malicious actors acquired sensitive financial information from a source outside the IRS about these households that led to the attempts to access the transcript application.</li>
<li class="last-child">&#8220;Offering free credit monitoring for the approximately 100,000 taxpayers whose Get Transcript accounts were accessed to ensure this information isn’t being used through other financial avenues. Taxpayers will receive specific instructions so they can sign up for the credit monitoring. The IRS emphasizes these outreach letters will not request any personal identification information from taxpayers. In addition, the IRS is marking the underlying taxpayer accounts on our core processing system to flag for potential identity theft to protect taxpayers going forward — both right now and in 2016.&#8221;</li>
</ul>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">80352</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-14 04:14:11 by W3 Total Cache
-->