Skip to main content

A new day, a new hack attack, with health giant Anthem the latest cyber-victim

A depiction of a hacker behind a screen of code.
Glebstock/Shutterstock
Is anyone safe from the malicious actions of cyber-criminals? It doesn’t look that way, and Anthem’s recent security breach may eclipse the invasion of privacy on Home Depot client records in terms of number of people directly affected.

We’re afraid to say this new attack makes North Korea’s bombardment of Sony’s database seem like a joke. Nearly 50,000 stolen Social Security numbers was a big deal, but I think we can all agree possibly intercepting the personal information of as many as 80 million former and current Anthem health insured is taking the game to the next level.

Recommended Videos

On the plus side, investigators believe actual medical records and financial details have stayed under lock and key for the duration of the system infiltration. Names, birthdays, home addresses, e-mails to Social Security numbers have been compromised, however. That last bit is sure to give a lot of people pause; it’s everything needed to commit ID theft.

And given the most popular passwords and PIN combinations, next to 1234 and 0000, remain dates easy to remember and familiar names, getting to your money should be a piece of cake for these skilled hackers. Not all is lost yet, though, with the FBI on the case, and no signs of illegally obtained data out in the open or on the black market.

There’s no word on what led to the raid, how well-protected all the sensitive information was to start with, or what methods the hackers used to gain unlawful access. We just know the attack was “sophisticated,” and that “customized” malicious software was involved, suggesting an “advanced” aggressor. Translation? It’s bad.

Adrian Diaconescu
Former Digital Trends Contributor
Adrian is a mobile aficionado since the days of the Nokia 3310, and a PC enthusiast since Windows 98. Later, he discovered…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more