Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Cybersecuirty. Show all posts

Enhanced Security Alert: Setting Up Stolen Device Protection on iOS 17.3

 


It has been announced that Apple has released iOS 17.3, the latest version of its iPhone operating system. This new version has several important new features, including Stolen Device Protection, which provides users with additional security measures if their phone is stolen. 

As every iPhone user should know, this is one of the most important features users can enable, as it ensures that they have the best security without doing anything. In case any user's iPhone is stolen and they have turned on Stolen Device Protection, it will be able to place limits on certain settings changes when it is not at home or work, which makes it difficult for them to make changes. 

Once the user's phone has been unlocked, and if a thief wants to change these settings, they will first have to authenticate using Face ID or Touch ID. It is therefore near-impossible for them to modify protected settings if they also have their biometrics – a near-impossible procedure. 

A feature called Stolen Device Protection, when enabled, adds extra security steps to a range of other security measures. Currently, it is required to use biometric authentication (such as Face ID or Touch ID) to access things like stored credit card information or account passwords, which is not possible to do with a passcode. If, however, users lose their phone, only they can retrieve these items, even if someone knows their passcode and the user can't find it.

The second thing that needs to be done is to wait an hour before attempting a security-related action – such as changing the Apple ID password – and then to pass a second biometric authentication test. As a result, the user will have a lot more time to mark their device as lost or remotely erase it to prevent the wrong hands from getting to their data. This should make it harder for a trespasser to access a user's data. When the Stolen Device Protection feature is activated, it adds additional security measures to specific features and actions within a recognized area of the iPhone in case the iPhone leaves that area. 

To ensure that key changes to accounts or the device itself remain inaccessible even if a thief gains access to the device's passcode, this additional security layer guarantees that they will never be able to gain access to the device. The thief will need to authenticate themselves using either Face ID or Touch ID to change these settings after unlocking the stolen device. 

If a thief has access to a stolen passcode, he or she will still have to replicate the actual owner's biometrics to modify protected settings, which is a very difficult task to accomplish. In addition to limiting what information the owner's iPhone thief can access, Stolen Device Protection also requires biometric authentication, such as Face ID or Touch ID, to view saved passwords or to make changes to the stolen Apple savings account, depending on which iPhone it is. 

Having an unlocked iPhone will stop thieves from using it to steal users' money or open an Apple credit card in the actual owner's name under the false identity of the owner. Some of the changes may have been made as a result of reports of iPhone owners having their devices snatched by thieves after they observed them logging in with their PINs and scanning their phones.

When an iPhone is accessed and accessed by someone who is not authorized to do so, thieves can steal money from the device, open credit card accounts, and do many other things once they have gained access to the device. The thieves can also completely lock victims out of their accounts with Apple, which makes it very difficult for them to disable their iPhones or track their stolen phones with Apple's Find My feature to track and disable their phones. 

The victims can sometimes not be able to access the photos and files that have been saved in their iCloud accounts. With this new feature, hackers will find it harder to use stolen iPhones to ruin users' lives and ruin their reputations. Having this feature on may cause some inconvenience for users at times, but the fact remains that they should turn it on to save the day. 

As soon as users have installed iOS 17.3 and wish to enable Stolen Device Protection, go to the Settings section of iOS and choose Face ID & Passcode. If users swipe down when using the app, they will find the section on Stolen Device Protection, which they should tap, to enable the feature.

Innovative Legal Move Restores Hospital's Stolen Information

 


There has been a handover of patient data stolen by the notorious LockBit gang from a cloud computing company to a New York hospital alliance that is partnered with that company. There was a lawsuit filed by the North Star Health Alliance - a group of hospitals - in November in the hopes of forcing LockBit to return the patient data cybercriminals had stolen from the hospitals and kept on the Massachusetts vendor's servers. 

The lawsuit was filed by North Star Health Alliance in November as a legal manoeuvre to force LockBit to return the patient data. There has been a lawsuit filed against unknown members of the LockBit group by a healthcare alliance of two hospitals and an orthopaedic group in upstate New York. 

However, the suit is a legal move designed to make a Massachusetts-based cloud services vendor turn over patient data stolen from hospitals and allegedly stored on the cloud service vendor's servers to force the gang to hand over the data. It is said by David Hoffman, general counsel of Claxton-Hepburn Medical Center, which recently filed a lawsuit against ransomware gang LockBit, that the ubiquity and anonymity of cryptocurrencies are driving economic, legal, and ethical challenges that place healthcare organizations at risk from cybercriminals. 

Despite their claims, the lawsuit asserts that the defendants "conspired to commit complex cybercrime and move stolen goods around the world." The lawsuit claims that the defendants' identities "are unknown at the moment, as they have perpetrated the subject scheme in secrecy and by using the internet." 

As part of the legal action against the hackers, the hospital group was able to serve a subpoena upon Boston-based cloud-based storage company Wasabi Technologies for the delivery of the data LockBit claimed to have stolen last summer from the hospital group. The cybercriminals allegedly stored the data on Wasabi's servers, according to court documents, which were then turned over to LockBit. 

There is an injunction sought by North Star Health Alliance to prevent the use, transfer or duplication of the exfiltrated data. According to the complaint, all copies of the stolen data must be destroyed after they have been returned to the hospital group, as well as all other copies being destroyed. 

It is reported by the hospitals that they needed access to the data to be able to identify individuals whose information could potentially be compromised as a result of the breach. It was announced recently that Wasabi Technologies turned over data stolen from LockBit and stored on its servers to North Star Health Alliance, which was a member of the North Star Health Alliance that has been affected by the August attack, said David Hoffman, general counsel for Claxton-Hepburn Medical Center. 

ISMG was notified by Wasabi that the firm is committed to ensuring that all regulatory requests related to the company are answered as soon as possible. The policy of the firm is to refrain from commenting on ongoing legal matters. 

According to the lawsuit, around August 30, when a hacker gained access to Wasabi's cloud server owned and operated by the hospital group, the data was stolen from the hospital group's IT infrastructure and transferred to a server owned and operated by Wasabi. A data breach occurred. 

As per a statement posted on Carthage Area Hospital's Facebook page on Sept. 6, North Star Health Alliance members have been required to reschedule a variety of outpatient appointments as a result of a cybersecurity incident that they were dealing with. 

There is a requirement in the finance sector to prove that companies understand their customers. This applies to regulations - such as those regarding cryptocurrency exchanges - he explained. The cloud providers should be obligated to meet these types of requirements to prevent the storage of stolen information, the operation of hostile scanners and the distribution of malware out of domestic data centres, or other types of information security threats, etc., in the cloud.

In addition to raising potential legal concerns for technology vendors seeking a way to avoid getting unknowingly entangled in cybercrime committed by their clients, Dave Bailey, vice president at privacy and security consultancy Clearwater, believes the North Star Health Alliance case also raises illegal concerns, which could cause vendors legal problems. 

To provide care and perform vital mission-critical functions, healthcare organizations are increasingly depending on online platforms for the collection and use of personal data. It should be noted however, that cybercriminals will continue to exploit gaps in the security of governments to steal personal information and profit from it.

In the end, this can have adverse effects on the organization's business operations, resulting in poor health services and ultimately a decline in performance. Healthcare providers and facilities should demonstrate prompt responsiveness to minimize potential damages swiftly. 

Additionally, it is imperative to establish comprehensive, integrated preventative measures to safeguard data and uphold continuous business operations. Healthcare organizations stand to gain considerable advantages from the implementation of multi-layered detection and recovery systems.

These systems aid in the identification and prevention of vulnerabilities and malware, mitigating the risk of exploitation and transmission to various data endpoints, including corporate networks, medical devices, company mobiles, and others. 

In the event of security incidents, such as data breaches, healthcare organizations must possess the capability to assess their impact accurately. Furthermore, they are obligated to promptly notify law enforcement and the relevant authorities. Simultaneously, it is essential to enact a well-defined action plan to address the needs of affected patients and individuals, ensuring a comprehensive and effective response to security breaches.