How SMS Works—and Why You Shouldn’t Use It Anymore

Text messages are sent in a multi-step process. While your message might be encrypted from your phone to the first cell tower, it’s not encrypted after that. And your SMSC may keep the message even if both the sender and recipient delete it. ..

popularmechanics. com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use sms?

Join the conversation on our Facebook Page!

Beware of public USB charging stations

Travelers are advised to avoid using public USB power charging stations in airports, hotels, and other locations because they may contain dangerous malware, the Los Angeles District Attorney said in a security alert published last week. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use public charging stations?

Join the conversation on our Facebook Page!

Microsoft to apply California’s privacy law for all US users

Microsoft‘s chief privacy officer promises to apply the CCPA to all US users, not just Californians. … The California Consumer Privacy Act, or CCPA, is currently set to go into effect on January 1, 2020. The upcoming law is considered one of the most restrictive privacy legislations in the world world. … Under the CCPA, companies must be transparent about the type of data they collect from users and how they use it. In addition, companies must also provide users with the option to prevent their personal information from being sold.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business be compliant in time?

Join the conversation on our Facebook Page!

Your WordPress site is at risk: These precautions and plugins can keep it secure

It’s an interesting paradox. WordPress powers 35 percent of all websites on the Internet, in part because it’s so flexible … But the paradox is that WordPress itself, along with the add-on plugins and themes. is open source. WordPress core, plugin, and theme development is done by a community of companies, professionals, and individual enthusiasts, each with varying degrees of software development and deployment skills. Each WordPress site is the sum of all those components

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How confident are you that your website is safe?

Join the conversation on our Facebook Page!

New ‘unremovable’ xHelper malware has infected 45,000 Android devices

Over the past few months, many users have complained about xHelper’s near “unremovable” state… While the trojan is currently engaging in spam and ad revenue, it also possesses other, more dangerous features. xHelper can download and install other apps, a function that the xHelper could at any point to deploy second-stage malware payloads, such as ransomware, banking trojans, DDoS bots, or password stealers.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you safe using an Android phone?

Join the conversation on our Facebook Page!

New IoT botnet army targeting small office and home routers

Tens of thousands of Wi-Fi routers are potentially vulnerable to an updated form of malware that takes advantage of known vulnerabilities to rope these devices into a botnet for the purposes of selling distributed denial of service (DDoS) attack capabilities to cyber criminals.  A new variant of Gafgyt malware – which first emerged in 2014 – targets small office and home routers from well-known brands

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using one of these routers?

Join the conversation on our Facebook Page!

This easy-to-use information-stealing trojan malware is quickly gaining popularity among cyber criminals

Racoon Stealer isn’t sophisticated, but it has stolen credit card information, passwords and more from hundreds of thousands of victims, and an aggressive marketing campaign means its popularity is still growing, security researchers warn.  A new kind of easy to use trojan malware is gaining popularity among cyber criminals, providing them with simple means of stealing credit card data, passwords and cryptocurrency — and it has already infected hundreds of thousands of Windows users around the world.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have any of your associate’s been hit, yet??

Join the conversation on our Facebook Page!

The Keys To A Digital Disaster Recovery Plan For Business Leaders

As a small business owner, I found out that I was the perfect target for cybercriminals when I read certified IT professional Darren Coleman’s book, Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud. It inspired me to arm myself with some common sense and the realization that I am responsible for my viral life just as I am for my real life. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep informed of the threats to your business?Join the conversation on our Facebook Page!

WAV audio files are now being used to hide malicious code

Two reports published in the last few months show that malware operators are experimenting with using WAV audio files to hide malicious code. …  All previous instances where malware used steganography revolved around using image file formats, such as PNG or JPG.  The novelty in the two recently-published reports is the use of WAV audio files, not seen abused in malware operations until this year. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you keeping up with all the latest threats?

Join the conversation on our Facebook Page!

FBI Warning: Multi-Factor Authentication Is Being Defeated

The FBI has now warned that it “has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks.” … But according to the FBI, this use of secondary tokens or one-time codes to back-up usernames and passwords still isn’t enough. Unless companies employ “biometrics or behavioral information—such as time of day, geolocation, or IP address,” there is a risk that an attack can either trick a user into disclosing a multi-factor authentication code or use technical interception to create one for themselves. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What additional security measures do you use?Join the conversation on our Facebook Page!

America’s First Privacy Law Is Here: What it Means for Business and You

The new rules will have significant effects on U.S. business and on privacy norms. There remains, however, considerable confusion over how the law will be enforced, and how much of a burden it will be to U.S. companies. What follows is a plain English explanation of the law, the politics surrounding it, and how it will affect businesses and consumers. What is CCPA and why is it such a big deal?

Fortune.com click the link to read the rest of the story. Our FREE Tools can help!

How will this new affect you?Join the conversation on our Facebook Page!

How The U.S. Hacked ISIS

In August 2015, the NSA and U.S. Cyber Command, the military’s main cyber arm, were at a crossroads about how to respond to a new terrorist group that had burst on the scene with unrivaled ferocity and violence. The one thing on which everyone seemed to agree is that ISIS had found a way to do something other terrorist organizations had not: It had turned the Web into a weapon. ISIS routinely used encrypted apps, social media and splashy online magazines and videos to spread its message, find recruits and launch attacks.  A response to ISIS required a new kind of warfare

NPR.org click the link to read the rest of the story. Our FREE Tools can help!

What surprise you the most about this history?Join the conversation on our Facebook Page!

Ransomware gang uses iTunes zero-day

After discovering evidence of the zero-day, Morphisec reported the issue to Apple, and the OS maker patched it this month. But Michael Gorelik, CTO at MorphiSec, says things aren’t that simple as updating the two Apple apps. Users who used these two apps in the past are also vulnerable.  … Sysadmins must scan workstations for the Bonjour component and remove it by hand, or install the latest iTunes

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you patched this?

Join the conversation on our Facebook Page!

California’s new privacy law gets teeth with proposed regulations

California proposed regulations on Thursday to dictate how the state will enforce its tough, new privacy law. The law, known as the California Consumer Privacy Act, gives consumers more control over how companies collect and manage their personal data. It goes into effect on Jan. 1.  The CCPA, seen as establishing the most stringent data privacy protections in the nation, allows people to request that data be deleted and gives them the opportunity to opt out of having their information sold to a third party. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will this affect your business?

Join the conversation on our Facebook Page!

Ransomware incident to cost Danish company a whopping $95 million

Demant, one of the world’s largest manufacturers of hearing aids, expects to incur losses of up to $95 million following what appears to be a ransomware infection that hit the company at the start of the month.  This marks one of the most significant losses caused by a cyber-security incident outside of the NotPetya ransomware outbreak…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What would it cost your business, if it took weeks to recover?

Join the conversation on our Facebook Page!

The ultimate smartphone guide to killing spyware and stalkerware

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Did you find anything on your smartphone?

Join the conversation on our Facebook Page!

Simjacker attack exploited in the wild to track users for at least two years

Simjack exploits a technology residing on the SIM card, the attack also works independently of the user’s device type.  “We have observed devices from nearly every manufacturer being successfully targeted to retrieve location: Apple, ZTE, Motorola, Samsung, Google, Huawei, and even IoT devices with SIM cards,” researchers said.  The only good news is that the attack doesn’t rely on regular SMS messages…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you suspect that you have been compromised?

Join the conversation on our Facebook Page!

Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How quickly do you patch fixes to these vulnerabilities?

Join the conversation on our Facebook Page!

 

States preparing for ransomware voter assaults

The challenge: lock down the most exposed part of the nation’s election system.  … A ransomware attack in 2020 could prove devastating, preventing voters from registering or poll workers from confirming voter eligibility, officials say.

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you concerned with this threat?

Join the conversation on our Facebook Page!

Ransomware hits hundreds of dentist offices in the US

Hundreds of dental practice offices in the US have had their computers infected with ransomware this week, ZDNet has learned from a source. The incident is another case of a ransomware gang compromising a software provider and using its product to deploy ransomware on customers’ systems.  In this case, the software providers are The Digital Dental Record and PerCSoft…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Was your dentist hit?

Join the conversation on our Facebook Page!

Phishing attacks jump by 21% in latest quarter, says Kaspersky

The number of worldwide phishing attacks detected by Kaspersky hit 129.9 million during the second quarter of 2019, according to a new report from the security vendor.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you been hit this year?

Join the conversation on our Facebook Page!

Ransomware attacks have more than doubled this year

Ransomware attacks have more than doubled this year, as criminals turn to powerful new forms of file-locking malware and additional attack techniques to conduct campaigns that are more lucrative than ever before.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your business been hit?

Join the conversation on our Facebook Page!

Hackers Want $2.5 Million Ransom for Texas Ransomware Attacks

The threat actor behind the coordinated ransomware attack against multiple Texas local governments may have gained access to its computer systems via a third-party software provider.  According to NPR, which first reported the development, the attackers want a collective ransom of $2.5 million. So far, there are no indications the amount has been paid.

TheNextWeb.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if hit by an attack?Join the conversation on our Facebook Page!

Ransomware Attack Hits 20+ Local Governments In Texas

The number of local government entities in Texas affected by a ransomware attack is now up to 23. In a release Saturday afternoon, the Texas Department of Information Resources said the local governments reported the attacks Friday morning. The majority of them are smaller local governments. …The DIR said it is continuing to investigate the origin of the attack, but at the moment believes it came from a “single threat actor.”

Kut.org click the link to read the rest of the story. Our FREE Tools can help!

How safe is your local government?Join the conversation on our Facebook Page!

New cryptojacking malware uses a sneaky trick to remain hidden

A newly-discovered form of cryptocurrency- mining malware is capable of remaining so well-hidden that researchers investigating it found that it had spread to almost every computer at a company that had become infected. … The Monero-cryptomining campaign was uncovered after Varonis’ security platform spotted suspicious network alerts and abnormal file activity on systems within organisations that had reported unstable applications and network slowdown. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Top Windows Defender expert: These are the threats security hasn’t yet solved

More danger lurks around the corner as advanced techniques used by state-backed hackers, for example, to steal information, filter down to financially motivated attackers. This threat applies to the continuing growth of file-less malware, supply-chain attacks, and phishing. “We’re seeing the trend of advanced techniques being used to deliver commodity malware. Once the advanced technique becomes public knowledge…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Warshipping: new hack tools shipped to your business

Researchers have described a new technique which could be used by cyber attackers to infiltrate corporate setups — with a little help from your friendly neighborhood delivery workers. … Dubbed warshipping, the technique is the result of the researchers’ investigation into possible infiltration methods through package deliveries to the office mail-room — or an individual victim’s front door. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you found odd electronics in packages to your office?

Join the conversation on our Facebook Page!

Microsoft alert: Hackers using IoT to breach business networks

One of Russia’s elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks, from where they pivot to other more high-value targets.  Attacks have been observed in the wild said the Microsoft Threat Intelligence Center…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you secured all your IoT devices?

Join the conversation on our Facebook Page!

How businesses can reduce the financial impact of data breaches

The financial impact of a data breach can devastate companies of all sizes but especially small and mid-sized businesses. The study found that organizations with fewer than 500 employees were hit by losses of more than $2.5 million on average… But there are actions that organizations can take to lessen the financial impact, as outlined in the report. …

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How many of their recommendations have you implemented?

Join the conversation on our Facebook Page!

Capital One’s breach was inevitable

Another day, another massive data breach.  This time it’s the financial giant and credit card issuer Capital One, which revealed on Monday a credit file breach affecting 100 million Americans and 6 million Canadians. Consumers and small businesses affected are those who obtained one of the company’s credit cards dating back to 2005.  That includes names, addresses, phone numbers, dates of birth, self-reported income and more credit card application data — including over 140,000 Social Security numbers in the U.S., and more than a million in Canada.

TechCrunch.com click the link to read the rest of the story. Our FREE Tools can help!

Should government do more?

Join the conversation on our Facebook Page!