12 signs you’ve been hacked — and how to fight back

Here are 12 sure signs you’ve been hacked and what to do in the event of compromise. Note that in all cases, the number 1 recommendation is to completely restore your system to a known good state before proceeding.

csoonline.com  click the link to read the rest of the story.

Have you been hacked? What did you do?Join the conversation on our Facebook Page!

Huawei accused of scheme to steal semiconductor technology from US start-up

A former Huawei employee has accused the company of trying to steal intellectual property in order to help China achieve technological dominance over the US by using a lawsuit against his Silicon Valley start-up.

scmp.com click the link to read the rest of the story.

Are you concerned about ip theft?Join the conversation on our Facebook Page!

Your computer could be quietly mining bitcoin — for someone else

Hackers are quietly hijacking personal computers, company servers, cable routers, mobile devices and other forms of computing power to stealthily mine cryptocurrencies — a problem that cybersecurity experts warn is growing rapidly.  The act, known as cryptojacking…

NBCnews.com click the link to read the rest of the story.

Has your computer started to act strangely slow?Join the conversation on our Facebook Page!

Cybercriminals Know Most Small Businesses Lack Cybersecurity

Could your business recover from an abrupt loss of $256,000? Because that’s how much a single cybersecurity hack could cost a small business, according to a recent analysis in Tech Republic.

entrepreneur.com click the link to read the rest of the story.

Have you invested in cybersecurity for your business?Join the conversation on our Facebook Page!

The fileless attack: Hacking without installing software

Cyber criminals don’t need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.  “We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These types of attacks don’t install new software on a user’s computer, so antivirus tools are more likely to miss them.

csoonline.com click the link to read the rest of the story.

Are you certain your security software detect these?Join the conversation on our Facebook Page!

This cryptojacking mining malware pretends to be a Flash update

Crooks are attempting to spread their cryptojacking malware to unsuspecting victims by disguising it as an update for Flash.  This particular mining operation is thought to have been operating since August this year with a big spike in activity in September and looks to trick potential victims into downloading an XMRig cryptocurrency miner — the malicious software runs in the background and secretly uses the power of the infected PC to acquire Monero for the hackers.

ZDnet.com click the link to read the rest of the story.

Could you have this malware on your computer and not know it?Join the conversation on our Facebook Page!

The top 10 cyberthreats IT security teams are facing right now

IT and security professionals surveyed said they were either highly concerned or extremely concerned about the following cyberthreats, the report found:

TechRepublic.com click the link to read the rest of the story.

What has been the greatest threat to your business?Join the conversation on our Facebook Page!

A big tech company is working to free the internet from big tech companies

Components of the decentralized web may already be emerging, but they are not ready for prime time. Cloudflare, a company that makes its money by hosting the internet’s contents on far-flung servers and uses algorithms to deliver them to users as fast as possible, wants to help change that. The first step is what the company calls a “gateway,” to which anyone can connect a website and begin serving data stored in a peer-to-peer file-sharing network called the Interplanetary File System(IPFS).

technologyreview.com click the link to read the rest of the story.

Are you looking for ways to succeed outside of the mega-platforms?Join the conversation on our Facebook Page!

U.S. warns of new hacking spree from group linked to China

The U.S. government on Wednesday warned that a hacking group widely known as cloudhopper, which Western cybersecurity firms have linked to the Chinese government, has launched attacks on technology service providers in a campaign to steal data from their clients.

yahoo.com click the link to read the rest of the story.

Are you concerned about foreign hackers?Join the conversation on our Facebook Page!

If you’ve been hacked, don’t count on the police for help

Even the FBI and your local police can’t agree on who you should contact first.  The FBI and your local police both suggest that you should call them. But experts warn that in many cases, neither agency will be able to help, especially if the criminal is asking for so little money. This dynamic underscores why these kinds of hacks — and yes, the porn scam really happened — are starting to proliferate.

cnet.com click the link to read the rest of the story.

Have you called the police after a hack?Join the conversation on our Facebook Page!

Hackers peddle thousands of air miles on the Dark Web for pocket money

Air miles are easily available online which are issued by airlines including Delta, British Airways, Emirates, and Alaska Air, among others.  After investigating Dark Web marketplaces including Dream Market, Olympus, and the Berlusconi Market, Bischoff found that sellers are flogging hundreds of thousands of frequent flier points.

ZDnet.com click the link to read the rest of the story.

Have you checked to see if your rewards are on the darkweb?Join the conversation on our Facebook Page!

8 Smart Ways To Maintain Your Digital Privacy

Regardless of how you use the internet, it’s nearly guaranteed that you are being tracked in some way. Natalie Triedman recently shared how people, often unknowingly, are sharing their location. We aren’t saying that you should freak out and stop using the internet, but it’s a good idea to be smart about your browsing.

Follow these tips to start protecting your information online. We’ve included some quick steps that everyone can do, as well as some more difficult and advanced methods for keeping your web data secure.

Hackernoon.com click the link to read the rest of the story.

Are you concerned about your browser tracking you?Join the conversation on our Facebook Page!

This new tech makes it harder for ISPs to spy on you

With the exception–perhaps–of your therapist or significant other, no one has more power to learn your secrets than your internet service provider. An ISP can see every website that you choose to access. …But new tech fixes are plugging the privacy holes that the government won’t.

fastcompany.com click the link to read the rest of the story.

Are you concerned about your ISP tracking you?Join the conversation on our Facebook Page!

 

This powerful off-the-shelf phone-hacking tool is spreading

Researchers at internet watchdog Citizen Lab have found that a sophisticated piece of spyware designed to break into most commercially available smartphones is now in use in 45 countries. Pegasus, designed by Israeli security firm NSO Group, has been pitched as a so-called “lawful intercept” tool for governments with highly questionable human rights records like Bahrain, United Arab Emirates, and Saudi Arabia.

fastcompany.com click the link to read the rest of the story.

Are you concerned about someone hacking your phone?Join the conversation on our Facebook Page!

Cyber security: Your boss doesn’t care and that’s not OK anymore

So why do the upper echelons of many organisations still not understand the risks they face or know what they should be doing to counter them?

One issue is that within many organisations, cyber security is still viewed as an issue for the IT department, rather than the business as a whole.

ZDnet.com click the link to read the rest of the story.

Can you answer the questions above?Join the conversation on our Facebook Page!

No, that “Google Business Manager” isn’t actually Google Calling

Taken verbatim from Google’s own Safety Center “Google does not make unsolicited sales calls from an automated system. However, we may place automated phone calls to your business, as a service to Google users, for non-sales tasks like making reservations or confirming your business hours. These calls are only enabled for businesses that offer public phone numbers for the purpose of receiving calls from the general public, and use the automated voice-calling service Duplex.”

Lemacksmedia.com click the link to read the rest of the story.

Has someone from “Google” called you?Join the conversation on our Facebook Page!

The WannaCry virus was just the beginning

WannaCry swept around the globe in what may have been the most extensive cyber attack in history. The ransomware, which gets its name from how it held a user’s data hostage, affected at least 200 000 computers in more than 150 countries, disrupting the operations of FedEx, Renault-Nissan, Russia’s interior ministry, Chinese universities, and the UK’s National Health Service (NHS).

Medium.com click the link to read the rest of the story.

Are you prepared?
Join the conversation on our Facebook Page!

IN CYBERWAR, THERE ARE NO RULES

It won’t be cutting-edge cyberattacks that cause the much-feared cyber-Pearl Harbor in the United States or elsewhere. Instead, it will likely be mundane strikes against industrial control systems, transportation networks, and health care providers—because their infrastructure is out of date, poorly maintained, ill-understood, and often unpatchable. Worse will be the invisible manipulation of public opinion and election outcomes using digital tools such as targeted advertising and deep fakes—recordings and videos that can realistically be made via artificial intelligence to sound like any world leader.

ForeignPolicy.com click the link to read the rest of the story.

How secure is your business to cyber warfare?Join the conversation on our Facebook Page!

Everything in your home is about to get smart. Here’s what to watch out for.

Smart devices can improve daily life by being aware of what you’re doing, so they can predict what you want them to do. For example, smart lights can learn when it’s bedtime and use that information to only use low brightness after that if you wander to the bathroom.   That convenience comes at a price, however: IoT devices generally require an internet connection to function, and harvest your information in return for helping improve your day.

ThinkGrowth.org click the link to read the rest of the story.

Are you using iot devices in your home?Join the conversation on our Facebook Page!

Beware: Hackers are trying to scam your company with this attack

Criminals use BEC attacks to gain access to a business email account and pretend to be the account owner to defraud the company and its employees, customers, or partners, the report noted. Scammers typically target employees with access to company finances or payroll data, and other personally identifiable information (PII).

TechRepublic.com click the link to read the rest of the story.

Has your firm had an BEC attack?Join the conversation on our Facebook Page!

Hackers steal more than $1M from global economy in a single minute: analysis

Approximately 1,861 people fall victim to cyberattacks in a span of 60 seconds, while some $1.14 million is stolen, cybersecurity firm RiskIQ found.

TheHill.com click the link to read the rest of the story.

Has your business been hacked?Join the conversation on our Facebook Page!

How To Survive A Ransomware Attack — And Not Get Hit Again

Ransomware comes in two types. The first encrypts the files on a computer or network; the second locks a user’s screen. “Some ransomware will also act like a worm – as was the case with WannaCry – and once inside a network, will spread laterally to other machines without interaction by the attacker or the infected user,” says a NCSC spokesman.

Forbes.com click the link to read the rest of the story.

Did you know that a new generation of antivirus programs also solve this problem?Join the conversation on our Facebook Page!

The Pandora’s Box of the Digital Age

In the past year alone, a series of hacks and ransomware attacks by hostile governments and other malign actors have raised alarms about a major threat to global stability. Unfortunately, many governments are responding by developing still more cyber weapons, on the mistaken assumption that offense is the best defense.

Project-Syndicate.org click the link to read the rest of the story.

Should nation states focus on offensive strategies?Join the conversation on our Facebook Page!

Apple iOS Users Targeted By New Exploit

The scam starts with an email informing users that their phones have been locked due to “illegal activity” and instructing them to call “Apple Care” to get the problem fixed.

DWPia.com click the link to read the rest of the story.

Have you received these emails?Join the conversation on our Facebook Page!

Antivirus Detects Fewer Than Half of Cyberattacks

Traditional tools are no longer sufficient to detect cyberattacks, the data shows: Antivirus systems only detected endpoint compromise 47% of the time; other attacks were caught through automated SIEM alerts (32%) and endpoint detection and response platforms (26%).

Darkreading.com click the link to read the rest of the story.

Are you implementing a next gen antivirus solution?
Join the conversation on our Facebook Page!

 

Why Nation-State Hacking Should Matter To Everyone

Perhaps most critical, particularly for business networks who also support employee or consumer devices, is to ensure every device receives these necessary updates and patches. One vulnerable entry point can spell the downfall of an entire organization or a household of connected devices.

Forbes.com click the link to read the rest of the story.

Are you considering purchasing one?
Join the conversation on our Facebook Page!

Security Spending is Up – But on Old Technologies that Don’t Work

Most organizations are spending their increased dollars on the same type of solutions that they implemented in the past. But these legacy solutions are no longer effective at preventing modern breaches. Today’s attackers use new methods that old security systems don’t detect.

lastline.com learn more here

Are you certain your current security technologies deserve your trust?
Join the conversation on our Facebook Page! 

DeepLocker: will malware weaponize artificial intelligence?

Traditional cyber security solutions, such as bolt-on antivirus software, are no longer enough. Cyber attackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.

PCMag.com learn more here

Are you adding new layers of protection for your business?
Join the conversation on our Facebook Page!