Microsoft case study: customer under attack by 6 hacker groups

Imagine discovering six threat actors all at the same time!  Recently, Microsoft’s Detection and Response Team (DART) was engaged by a large, multinational company that faced a sophisticated, state sponsored advanced persistent threat.

Microsoft.com click the link to read the rest of the story.  Get our free tools here.

How will you protect your business?Join the conversation on our Facebook Page!

Nasty phishing scams aim to exploit coronavirus fears

Cyber criminals are aiming to take advantage of fears over coronavirus as a means of conducting phishing attacks and spreading malware, along with stealing login credentials and credit card details.  Cybersecurity companies have identified a number of campaigns by hackers who are attempting to exploit concerns about the COVID-19 outbreak for their own criminal ends.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any of these attacks?Join the conversation on our Facebook Page!

2020’s Most common cyberattacks & how to defend against them

Protecting your business from cyberattacks is a never-ending challenge. But to make sure your security eggs are in the right baskets, here’s a look at the most common cyberattacks we’ll likely see this year and how to defend against them.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Which has been a greater problem for your firm: phishing attacks or reansomware?Join the conversation on our Facebook Page!

People Who Achieve Their Goals Live By These 7 Habits

So, if this is something you’re looking to improve in yourself, here are 12 simple ways you can start practicing the art of self-discipline:  1. Don’t set a goal without knowing how you’re going to track its progress. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

How important is discipline in your life?Join the conversation on our Facebook Page!

Ransomware victims are paying out millions a month. One has cost them the most

Over six-and-a-half years, ransomware victims have handed over vast amounts of bitcoin to crooks. Some variants of the malware have generated more ransom than others. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Has you company been hit with this?Join the conversation on our Facebook Page!

Coronavirus: Effective strategies and tools for remote work

Whether or not coronavirus becomes a full outbreak, the trend of working from afar is currently experiencing a major boost as businesses shift to digital channels and more people avoid physical gatherings. Here are key approaches and tools to get the most from remote work. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you have an emergency work remote from home plan?Join the conversation on our Facebook Page!

MIT’s 2020 – Top 10 Breakthrough Technologies

MIT’s  annual list of technological advances that they believe will make a real difference in solving important problems. They include: Unhackable internet, Hyper-personalized medicine, Digital money, Anti-aging drugs, AI-discovered molecules, Satellite mega-constellations, Quantum supremacy, Tiny AI, Differential privacy…

TechnologyReview.com click the link to read the rest of the story.  Get our free tools here.

How will these advances affect your business?Join the conversation on our Facebook Page!

“Shark Tank” star loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. … “I lost the $388,700 as a result of a fake email chain sent to my company,” she told the magazine. “The scammer disappeared and I’m told that it’s a common practice, and I won’t be getting the money back.” …

CBS.com click the link to read the rest of the story.  Get our free tools here.

Is you team trained in how to spot these scams?Join the conversation on our Facebook Page!

Use This Simple Business Tool to Make Good Decisions Faster

It’s tempting with a long task list to spread yourself too thin. You can stay busy all day and still find you have not much progress to show for it by the end of the night. Now apply the 80/20 rule to your to-do list. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

Will this help you make better decisions?Join the conversation on our Facebook Page!

Iranian hackers planting backdoors in companies around the world

ClearSky research team has uncovered a widespread Iranian offensive campaign which we call “Fox Kitten Campaign”; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world. …

ClearSkySec.com click the link to read the rest of the story.  Get our free tools here.

How does your firm monitor such breaches?Join the conversation on our Facebook Page!

FBI: passphrases superior to complex passwords

The FBI says “Instead of using a short, complex password that is hard to remember, consider using a longer passphrase.”  “This involves combining multiple words into a long string of at least 15 characters,” it added. “The extra length of a passphrase makes it harder to crack while also making it easier for you to remember.” …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you use pass Phrases?Join the conversation on our Facebook Page!

Can’t Kick a Bad Habit? You’re Probably Doing It Wrong

I had just finished giving a speech on building habits when a woman in the audience exclaimed, “You teach how to create habits, but that’s not my problem. I’m fat!” The frustration in her voice echoed throughout the room. “My problem is stopping bad habits. That’s why I’m fat. Where does that leave me?” … The first step is to realize that starting a new routine is very different from breaking an existing habit. …

nirandfar.com click the link to read the rest of the story.  Get our free tools here.

What have you done to overcome bad habits?Join the conversation on our Facebook Page!

US Warns: Huawei Has ‘Back Door’ Access in Its Networks

Officials from the United States presented evidence to the United Kingdom and other allies that Huawei has the ability to secretly access information on mobile networks through “back doors” typically used by law enforcement agencies, leading to fears that the Chinese Communist Party (CCP) may use Huawei to spy on Western nations that allow access to the company. …

Breitbart.com click the link to read the rest of the story.  Get our free tools here.

Will you avoid Huawei networks?Join the conversation on our Facebook Page!

Official: Puerto Rico govt loses $2.6M in phishing scam

Puerto Rico’s government has lost more than $2.6 million after falling for an email phishing scam, according to a senior official. … Rivera said the government agency transferred the money on Jan. 17 after receiving an email that alleged a change to a banking account tied to remittance payments, according to a police statement. …

APnews.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your office from these scams?Join the conversation on our Facebook Page!

 

Watch Out: This Verizon Smishing Scam Is Crazy Realistic

Text message scams are becoming more common, and the latest scam we’ve seen is the most sophisticated yet. The scammer impersonates Verizon, sending you an “account security” text message that takes you to a shockingly convincing copy of Verizon’s website.  We opened the link to see the scam in action. Don’t try this at home: If you receive a scam message, we recommend against opening any links attached to it. You should also delete the message and block the sender. …

HowToGeek.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any text message scams?Join the conversation on our Facebook Page!

Leadership: Wars Are Not Won by Military Genius or Decisive Battles

Losers of most major wars in modern history lost because they overestimated operational dexterity and failed to overcome the enemy’s strategic depth and capacity for endurance. Winners absorbed defeat after defeat yet kept fighting, overcoming initial surprise, terrible setbacks and the dash and daring of command ‘genius’.

Aeon.co click the link to read the rest of the story.  Get our free tools here.

Have you given up on an opportunity too quickly?Join the conversation on our Facebook Page!

What Happens When You Stop Talking About Yourself in Conversations

The temptation to always talk about ourselves is a new tradition like Black Friday without the cheap sales. It’s hurting our conversations and over-inflating our egos. Experiment: I tried to go two days without talking about myself in every conversation to see what would happen. Would it make a difference? Would people notice? What would it do to relationships? This is what happens when you stop talking about yourself.

Medium.com click the link to read the rest of the story.  Get our free tools here.

Would you try this experiment? Join the conversation on our Facebook Page!

Popular internet scams to watch out for in 2020

The internet is filled with scammers looking to steal your private information. … You should also be able to spot threats on your own. To help, here are a few scams that are currently trending online.

BigThink.com click the link to read the rest of the story.  Get our free tools here.

How do you spot scams?Join the conversation on our Facebook Page!

Minimize Risk While Surfing the Web on Your Phone

We simply enjoy surfing on wireless networks wherever we go… assume that none of these networks are safe. This is especially important for those of us who use our mobile devices for online banking, accessing medical records, storing our passwords with a password manager, or browsing files on Dropbox, Google Drive, or Windows OneDrive. … Here are a few tools that can help protect your most precious data from those with powerful digital tools and prying eyes.

Medium.com click the link to read the rest of the story.  Get our free tools here.

What precautions do you use when accessing using public wifi?Join the conversation on our Facebook Page!

Why procrastination is about managing emotions, not time

Procrastination is an issue with managing our emotions, not our time. The task we’re putting off is making us feel bad – perhaps it’s boring, too difficult or we’re worried about failing – and to make ourselves feel better in the moment, we start doing something else…

LinkedIn.com click the link to read the rest of the story.  Get our free tools here.

What are you procrastinating about?Join the conversation on our Facebook Page!

This crafty malware makes you retype your passwords so it can steal them

A trojan malware campaign is targeting online banking users around the world with the aim of stealing credit card information, finances and other personal details. … Like many other hacking campaigns, Metamorfo begins with phishing emails that in this case claim to contain information about an invoice and invite the user to download a .ZIP file….

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen this yet?Join the conversation on our Facebook Page!

New service notifies companies when their employees get phished

Companies across the world now have a new free web service at their disposal that will automatically send out email notifications if one of their employees gets phished.  The service is named “I Got Phished” and is managed by Abuse.ch, a non-profit organization known for its malware and cyber-crime tracking operations.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Will you sign up?Join the conversation on our Facebook Page!

Get More Done In 2 Days Than Most People Do In 2 Weeks

We all deal with countless deadlines every week, even though we dread them. They are the chronological equivalent of a budget. By setting aside a portion of your time to complete a task in advance, you avoid over-spending time.  Deadlines make you take action. …

Medium.com click the link to read the rest of the story.  Get our free tools here.

Do you set deadlines for everything?Join the conversation on our Facebook Page!

Patch the top ten software flaws used by crooks

The most commonly exploited vulnerabilities – and the technology they target … patch these now!  Adobe Flash Player, Microsoft Internet Explorer, Microsoft Office, Adobe Flash Player, Microsoft WinRAR

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Do you patch your apps?Join the conversation on our Facebook Page!

Teens get sneaky with their Apple AirPods. Will business follow?

This week, a video has wafted around the web that may turn your head away or your stomach around. Or your mind toward emigration to undeveloped land.  You see, this video showed the fun way kids are apparently communicating in class. With each other, that is.  It appears they’re swapping a single Apple AirPod of theirs for a single Apple AirPod of their friends

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen employee’s doing this?Join the conversation on our Facebook Page!

 

Someone is uninstalling malware from infected PCs

A mysterious entity appears to have hijacked the backend infrastructure of the Phorpiex (Trik) botnet and is uninstalling the spam-bot malware from infected hosts, while also showing a popup telling users to install an antivirus and update their computers… “This is truly happening,” Yaniv Balmas, Head of Cyber Research at Check Point …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Who do you think is doing this?Join the conversation on our Facebook Page!

Beware of this sneaky phishing technique now being used in more attacks

Security company researchers warn of a large increase in conversation-hijacking attacks. Here’s what they are and how to spot them.

ZDNet.com click the link to read the rest of the story. Get our free tools here.

Has your team received training in how to spot these attacks!Join the conversation on our Facebook Page!

515,000+ hacked passwords+ for servers, routers, and IoT devices now online

The list, which was published on a popular hacking forum, includes each device’s IP address, along with a username and password for the Telnet service, a remote access protocol that can be used to control devices over the internet.  …

ZDNet.com click the link to read the rest of the story. Get our free tools here.

You may be contacted about your server by legit security people. But make changes with people you know and trust!Join the conversation on our Facebook Page!