Uncategorized

Nebula Consulting is Now an Authorized Dealer for Siedle Intercom & Security Systems

Nebula Consulting is now an official authorized dealer for Siedle Security Systems. Siedle secures homes and buildings with precisioned technological mastery and uncommon elegance. For over 70 years, Siedle has designed high-end commercial and residential security systems featuring anti-burglary, card access, IP intercoms and closed circuit TV providing secure video door IP intercom functions. Click here for more info. Commonly known as the Mercedes of Intercom systems, Siedle's custom solutions are perfect for apartment & condominium complexes, video gate door access systems, parking garages, hotels, hospitals, and commercial buildings. If you are looking for a high-end, modern solution, Siedle is the perfect solution.

Covering all of New England, we claim the largest territory of any Siedle dealer in the area. For a free consultation, call a security engineer today at 617-477-2337 or email us at info@nebulanewengland.com.

Medical Identity Theft: Detection and Prevention Tips

The internet can be a dangerous place, particularly when sensitive personal information, such as medical records, are involved. One such internet-based crime is medical identity theft, which can become a living nightmare for unlucky victims. One of the most common problems associated with this kind of ID theft is having your credit rating damaged. If your medical information is tampered with, you may encounter life-threatening consequences when you access medical care and possibly end up with thousands of dollars in medical bills.

We hope this never happens to you, but here are some medical identity theft detection and prevention tips – just in case.

Medical Identity Theft – What Is It? Medical identity theft occurs when someone uses your personal health-related information without your knowledge or consent for acquiring medical treatment, submitting claims or obtaining goods and services. These thieves target personal information including your name, Social Security number (SSN) or health insurance ID.

How to Detect Medical Identity Theft The easiest way to stay vigilant when it comes to medical identity theft is to regularly check your medical purchase history. Take a visit to the hospital where you get your medication and ask if any purchases were made on your account. You don’t need to do this all the time, but check when you have a suspicion that your identity has been compromised. Also, don’t throw away receipts so that you can keep track of your purchase history.

The Three Main Sources of Medical Identity Theft

  1. Hackers: There are people who earn money by selling personal and medical information to those who want to use another person’s identity to obtain medical goods and services. Additionally, the recent increase in the prevalence of electronic health records, or EHRs, is giving these hackers a greater chance of illegally accessing private information.
  2. Friendly Fraud: This threat occurs when a family member or a friend illegally uses the identity and medical information of another person. Studies show that approximately 33-50 percent of all medical identity theft is committed by victims’ family members or friends. Friendly fraud may also occur when an employee gives out a plan number or insurance card in an attempt to help a friend in need.
  3. Providers: Identity thieves may come in the form of dishonest staff from the offices of healthcare providers, including doctors, nurses, receptionists, technicians or other individuals. These criminals steal your private information with the intention to sell what they have gathered to those who will assume the victim’s identity. They can also use your information to fool insurance companies into paying out false claims.

 

How to Prevent Medical Identity Theft Preventing medical identity theft may not be as difficult as it seems. Besides keeping your information as secure as possible, your best defense is to always be vigilant and review your bills, medical records and insurance information carefully. Here are several tips you can follow to help prevent medical identity theft:

  • Watch your medical records for accuracy. Check all your mail, email and records related to your healthcare. Review statements and other communications from your healthcare providers and insurance company closely, checking for any strange or suspicious items and services. In many cases, identity thieves may accidentally add their own information to your records. Monitoring your own medical history is an ideal way to nip thefts in the bud.
  • Keep your information secure. Make a point to share as little personal data as you can. The less information you give out, the less there is to be used against you. Sometimes, sharing sensitive information is not necessary, so only give this kind of data on a need-to-know basis. It’s always a good idea to flat out ask if information such as your driver’s license, SSN and date of birth are really required to process you as a patient. Lastly, always be careful about storing your medical information, whether digital or physical, and take the necessary steps to keep it from leaking.
  • Learn to spot phishing emails. Phishing is an illegal practice where unauthorized persons attempt to trick individuals into revealing private information, such as passwords, SSNs, credit card and bank account numbers. This is accomplished by installing malware on your connected devices or send legitimate-looking emails claiming to be from reputable companies. Learn to spot phishing emails by verifying the email address from which the email was sent. After clicking on a link provided by an email, ensure that the domain in the address field is the same company you believe you’re dealing with. When in doubt – if something looks suspicious – ignore or delete it.
  • Avoid using public WiFi. Public WiFi can be notoriously unsafe. However, people still choose to use it and put themselves at risk. Know that any time you access information via a public network, anyone else using the service can see the information you are sending. The sites you visit, the text you send and your login information are all put on display for identity thieves to see. It’s best to avoid using these networks and/or limit your use to casual browsing without entering sensitive information. In instances when you absolutely need to log in to a public wireless network, be sure that your firewall is turned on and you have up-to-date malware protection. You can also consider using a virtual private network (VPN).

Millions of people are faced with the threat of medical identity theft on a day-to-day basis. If you become a victim, the repercussions may be devastating to both you and your family. As soon as you notice something that isn’t right, it’s best to resolve the issue immediately. Always remember these safety precautions to help decrease the chances of these security breaches.

Source: NCSA

Nebula Consulting is Now an Authorized Hanwha Samsung Surveillance Dealer/Installer

 

As of July 2017, Nebula Consulting is an an authorized dealer for Hanwha Samsung Security Surveillance products. Hanwha Techwin, formerly Samsung Security, is a surveillance company that specializes in IP-based & CCTV security cameras, network video recorders, digital video recorders and advanced surveillance analytical software. For more info, check out our product listings: https://nebulanewengland.com/surveillance.php

Video surveillance is essential for businesses as it protects the company, protects the employees and increases productivity. Our engineers will analyze the requirements and design a solution that best fits your environment. Our IP-based solutions integrate with your existing infrastructure, significantly reducing cost. Security feeds can be securely accessed via your phone, tablet or computer - from anywhere in the world! Our business is designed around cyber security - we will ensure your security feeds are private and secure.

Nebula Consulting will ensure your company and customers are safe so you can focus on what you do best - running your business. Call a security engineer today at 617-477-2337 or email us at info@nebulanewengland.com.

Yealink W56P DECT/VoIP Wireless Handset Demo

https://youtu.be/0nfMBtOPOAc Yealink’s upgraded DECT phone W56P is developed to enhance communication for on-the-go workers and works with Nebula's on premise and cloud-based phone systems. Featuring a big 2.4-inch color screen, an elegant industrial design, excellent battery performance and other multiple usability and phone management upgrades, the W56P ensures busy workers can enjoy a pleasant user experience and are always online.

Features: . Exceptional HD sound with wideband technology . Up to 4 simultaneous voice calls . Up to 5 DECT cordless handsets . Up to 5 Multiple Lines . 2.4" 240 x 320 color screen with intuitive user interface . Up to 30 hours talk time, Up to 400 hours standby time . Quick charging: 10 mins charge time for 2 hours talk time . USB Charger Cradle . Headset connection via 3.5 mm jack . Charger wall mountable . New belt clip with better user experience

Specifications: . Up to 4 simultaneous calls . Up to 5 handsets, up to 5 VoIP accounts . Handset select for receiving  call . Handset and Number select for making call . Paging, intercom, auto answer . Call hold, call transfer, 3-way conferencing . Switching between calls . Call waiting, mute, DND . Caller ID display, redial . Anonymous call, anonymous call rejection . Call forward (always/busy/no answer) . Speed dial, voicemail, silence . Message Waiting Indication (MWI) . Local phonebook for up to 500 entries (store in the base) . Remote phonebook/LDAP . Phonebook search/import/export . Call history utgoing/missed/accepted) . Direct IP call without SIP proxy . Reset to factory, reboot . Keypad lock, emergency call . Dial Plan, music on hold . Broadsoft directory, BroadSoft Call Log . Broadworks feature key synchronization

Personalization: . 9 ringer melodies . Screen saver . Multi-language support

Physical Features: . Indoor Range: 20m~50m (The ideal distance is 50m) . Outdoor Range: 300m (In ideal conditions) . Standby Time: 400h (In ideal conditions) . Talk Time: 30h . 2 4’’ 240x320 pixels color display . Desktop or wall mountable . LCD backlit, key backlit . Energy-saving ECO mode/ECO Mode+ . 12 key numerical keypad, 5 navigation keys 2 softkeys, 6 function keys, 6 shortcut keys . 3 LEDs on Base: 1 x power, 1 x Network, 1 x Call . Charger: DC 5V/600mA Output . Phone size: 175mm x 53mm x 20.3mm . Base station size: 153.5mm x 108.5mm x 45mm . Operating humidity: 10 ~ 95% . Operating temp: -10 ~ +50°C

June 2017 CERT Cyber Vulnerabilities

Each month, Nebula Consulting posts vulnerability notes from CERT’s vulnerability database. Check back often for updates! 07 Jun 2017 - VU#489392 - Various WiMAX routers contain a authentication bypass vulnerability in custom libmtk httpd plugin

Several WiMAX routers making use of a custom httpd plugin for libmtk (the MediaTek SDK library) are vulnerable to an authentication bypass that allows a remote, unauthenticated attacker to change the administrator password on the device.

By sending a crafted POST request to commit2.cgi, an unauthenticated, remote attacker may reset the administrator password by sending a new password in the POST ADMIN_PASSWD variable.

A remote, unauthenticated attacker may gain administrator access to the device after changing the administrator password on the device with a crafted POST request.

The reporter has identified the following model routers as being impacted; other models and firmware versions may also be impacted. The reporter notes that some devices have remote administration enabled by default, allowing an internet-based attacker to attempt this exploit.

GreenPacket OX350 (Version: ?) GreenPacket OX-350 (Version: ?) Huawei BM2022 (Version: v2.10.14) Huawei HES-309M (Version: ?) Huawei HES-319M (Version: ?) Huawei HES-319M2W (Version: ?) Huawei HES-339M (Version: ?) MADA Soho Wireless Router (Version: v2.10.13) ZTE OX-330P (Version: ?) ZyXEL MAX218M (Version: 2.00(UXG.0)D0) ZyXEL MAX218M1W (Version: 2.00(UXE.3)D0) ZyXEL MAX218MW (Version: 2.00(UXD.2)D0) ZyXEL MAX308M (Version: 2.00(UUA.3)D0) ZyXEL MAX318M (Version: ?) ZyXEL MAX338M (Version: ?)

Solution: The CERT/CC is currently unaware of a practical solution to this problem. Check often with the vendor for a possible solution.

08 Jun 2017 - VU#251927 - CalAmp LMU-3030 devices may not authenticate SMS interface

OBD-II devices are used to provide telematics information for managers of fleets of vehicles. One type of device, manufactured by CalAmp, has an SMS (text message) interface. We have found multiple deployments where no password was configured for this interface by the integrator / reseller. Companies using the CalAmp hardware should be aware that they need to set a password or disable SMS. Vendors were notified and the SMS interface was disabled or password-protected by all vendors known to be affected.

The CalAmp LMU 3030 series of devices includes an SMS interface on both CDMA and GSM versions of the device. This interface must be password protected, otherwise, the attacker only needs to know the phone number of the device (via an IMSI Catcher, for example) to send administrative commands to the device. These commands can be used to provide ongoing, real-time access to the device and can configure parameters such as IP addresses, firewall rules, and passwords.

The devices provide vehicle tracking via GPS coordinates, heading, and speed, as well as maintenance information. Older versions of the firmware could be remotely updated with malicious code that could affect the CAN bus of the vehicle.

Solution: Configure SMS password. Vendors that were known to be affected have been contacted and have password-protected or disabled the SMS interface. Other vendors that use the CalAmp LMU-3030 in their system should do the same.

13 Jun 2017 - VU#768399 - HPE SiteScope contains multiple vulnerabilities

HPE's SiteScope is vulnerable to several vulnerabilities. The researcher reports that version 11.31.461 is affected; other versions may also be impacted. CERT/CC has not received further information on affected versions from HPE

Previously reported as ZDI-12-176 in 2012, SiteScope version 11.31.461 and possibly other versions do not properly authenticate users before allowing file access. Successful exploits allows attackers to bypass security restrictions and to perform unauthorized actions such as downloading arbitrary files from the system. A Metasploit modulehp_sitescope_getfileinternal_access released in 2012 is confirmed by the reporter to still work against version 11.31.461.

An unauthenticated, remote attacker may be able to access arbitrary files from the system running SiteScope, or obtain credentials to SiteScope.\

Solution: Apply an update. HPE has released updated and mitigation advice in a security advisory dated 2017 June 27. Affected users are encouraged to apply all available updates and follow HPE's recommended mitigations.

15 Jun 2017 - VU#846320 - Samsung Magician fails to update itself securely

Samsung Magician fails to securely check for and retrieve updates, which an allow an authenticated attacker to execute arbitrary code with administrator privileges

Samsung Magician is a management utility for Samsung SSDs. Prior to version 5.0, Samsung Magician checks for and retrieves updates over HTTP. Prior to version 5.1, Samsung Magician uses HTTPS to perform update operations, however it does not validate SSL certificates.

An attacker on the same network as, or who can otherwise affect network traffic from, a Samsung Magician user can cause the Magician update process to execute arbitrary code with system administrator privileges.

Solution: Apply an update. This issue is addressed in Samsung Magician 5.1. Note that because the update mechanism is vulnerable, do not use the self-update mechanism for Samsung Magician to obtain the fixed version.

19 Jun 2017 - VU#489392 - Acronis True Image fails to update itself securely

Acronis True Image fails to securely check for and retrieve updates, which an allow an authenticated attacker to execute arbitrary code with administrator privileges.

Acronis True Image is a disk backup utility for Windows and Mac systems. Acronis True Image versions through and including 2017 Build 8053 performs update operations over unprotected HTTP channels. Downloaded updates are not validated beyond verifying the server-provided MD5 hash.

An attacker on the same network as, or who can otherwise affect network traffic from, an Acronis True Image user can cause the True Image update process to execute arbitrary code with system administrator privileges.

Solution: Apply an update. his issue is addressed in Acronis True Image 2017 Build 8058. Although the updates are still checked and downloaded over HTTP, the certificate of the downloaded update is verified.