Google quantum computer leaves supercomputers in the dust

The era of practical quantum computers has begun … “Our machine performed the target computation in 200 seconds, and from measurements in our experiment we determined that it would take the world’s fastest supercomputer 10,000 years to produce a similar output,” Google researchers said in a blog post about the work. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

What business opportunities will this mean for you?

Join the conversation on our Facebook Page!

The Keys To A Digital Disaster Recovery Plan For Business Leaders

As a small business owner, I found out that I was the perfect target for cybercriminals when I read certified IT professional Darren Coleman’s book, Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud. It inspired me to arm myself with some common sense and the realization that I am responsible for my viral life just as I am for my real life. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you keep informed of the threats to your business?Join the conversation on our Facebook Page!

Alexa and Google Home still being used to eavesdrop on users

Amazon, Google fail to address security loopholes in Alexa and Home devices more than a year after first reports. … Neither Amazon nor Google have responded to requests for comment…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still willing to use these devices?

Join the conversation on our Facebook Page!

WAV audio files are now being used to hide malicious code

Two reports published in the last few months show that malware operators are experimenting with using WAV audio files to hide malicious code. …  All previous instances where malware used steganography revolved around using image file formats, such as PNG or JPG.  The novelty in the two recently-published reports is the use of WAV audio files, not seen abused in malware operations until this year. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you keeping up with all the latest threats?

Join the conversation on our Facebook Page!

FBI Warning: Multi-Factor Authentication Is Being Defeated

The FBI has now warned that it “has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks.” … But according to the FBI, this use of secondary tokens or one-time codes to back-up usernames and passwords still isn’t enough. Unless companies employ “biometrics or behavioral information—such as time of day, geolocation, or IP address,” there is a risk that an attack can either trick a user into disclosing a multi-factor authentication code or use technical interception to create one for themselves. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What additional security measures do you use?Join the conversation on our Facebook Page!

America’s First Privacy Law Is Here: What it Means for Business and You

The new rules will have significant effects on U.S. business and on privacy norms. There remains, however, considerable confusion over how the law will be enforced, and how much of a burden it will be to U.S. companies. What follows is a plain English explanation of the law, the politics surrounding it, and how it will affect businesses and consumers. What is CCPA and why is it such a big deal?

Fortune.com click the link to read the rest of the story. Our FREE Tools can help!

How will this new affect you?Join the conversation on our Facebook Page!

How The U.S. Hacked ISIS

In August 2015, the NSA and U.S. Cyber Command, the military’s main cyber arm, were at a crossroads about how to respond to a new terrorist group that had burst on the scene with unrivaled ferocity and violence. The one thing on which everyone seemed to agree is that ISIS had found a way to do something other terrorist organizations had not: It had turned the Web into a weapon. ISIS routinely used encrypted apps, social media and splashy online magazines and videos to spread its message, find recruits and launch attacks.  A response to ISIS required a new kind of warfare

NPR.org click the link to read the rest of the story. Our FREE Tools can help!

What surprise you the most about this history?Join the conversation on our Facebook Page!

Ransomware gang uses iTunes zero-day

After discovering evidence of the zero-day, Morphisec reported the issue to Apple, and the OS maker patched it this month. But Michael Gorelik, CTO at MorphiSec, says things aren’t that simple as updating the two Apple apps. Users who used these two apps in the past are also vulnerable.  … Sysadmins must scan workstations for the Bonjour component and remove it by hand, or install the latest iTunes

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you patched this?

Join the conversation on our Facebook Page!

California’s new privacy law gets teeth with proposed regulations

California proposed regulations on Thursday to dictate how the state will enforce its tough, new privacy law. The law, known as the California Consumer Privacy Act, gives consumers more control over how companies collect and manage their personal data. It goes into effect on Jan. 1.  The CCPA, seen as establishing the most stringent data privacy protections in the nation, allows people to request that data be deleted and gives them the opportunity to opt out of having their information sold to a third party. …

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will this affect your business?

Join the conversation on our Facebook Page!

OneDrive adds Personal Vault option for private files and photos

A new feature in the consumer version of Microsoft’s OneDrive lets you store sensitive files in the cloud with extra encryption and authentication options. But you’ll need an Office 365 subscription for unlimited access. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will you use this new feature?

Join the conversation on our Facebook Page!

SIM Swapping Is the Biggest Security Threat You Face, and Almost No One Is Trying to Fix It. Here’s Why It Matters

Imagine you try to log into your bank account one day to setup a payment on your mortgage. You realize that something’s wrong when the bank’s website tells you you’ve entered the wrong password. That’s strange, you think as you click the link to “reset your password.”  It’s an easy process, but first, the bank requires that you prove you’re actually you, by sending a simple text message with a six-digit code to the mobile phone number on file. But when you request your code, the text never comes. …

Inc.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using your phone for security authentication?

Join the conversation on our Facebook Page!

Ransomware incident to cost Danish company a whopping $95 million

Demant, one of the world’s largest manufacturers of hearing aids, expects to incur losses of up to $95 million following what appears to be a ransomware infection that hit the company at the start of the month.  This marks one of the most significant losses caused by a cyber-security incident outside of the NotPetya ransomware outbreak…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What would it cost your business, if it took weeks to recover?

Join the conversation on our Facebook Page!

99% of all misconfigurations in the public cloud go unreported

Today’s data breaches often seem to be caused not just by malware infections or external threat actors, but human error, insiders with an ax to grind, and simple security failures. Some companies will bury their head in the sand, attempting to ignore responsible, private disclosures of data leaks, while others will act rapidly when their information — and reputation — is at stake.

According to new research released Tuesday and conducted by cybersecurity firm McAfee, titled, “Cloud-Native: The Infrastructure-as-a-Service Adoption and Risk,” the majority of IaaS misconfigurations are going unnoticed. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you tested your cloud service security?

Join the conversation on our Facebook Page!

Silicon Valley is terrified of California’s privacy law. Good.

In a little over three months, California will see the widest-sweeping state-wide changes to its privacy law in years. California’s Consumer Privacy Act (CCPA) kicks in on January 1 and rolls out sweeping new privacy benefits to the state’s 40 million residents — and every tech company in Silicon Valley.  California’s law is similar to Europe’s GDPR. …

TechCrunch.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing your business for the new laws?Join the conversation on our Facebook Page!

The ultimate smartphone guide to killing spyware and stalkerware

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Did you find anything on your smartphone?

Join the conversation on our Facebook Page!

Simjacker attack exploited in the wild to track users for at least two years

Simjack exploits a technology residing on the SIM card, the attack also works independently of the user’s device type.  “We have observed devices from nearly every manufacturer being successfully targeted to retrieve location: Apple, ZTE, Motorola, Samsung, Google, Huawei, and even IoT devices with SIM cards,” researchers said.  The only good news is that the attack doesn’t rely on regular SMS messages…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you suspect that you have been compromised?

Join the conversation on our Facebook Page!

Scammers find powerful way to impersonate you and empty your bank accounts

Criminals are using AI-generated audio to impersonate a CEO’s voice and con subordinates into transferring funds to a scammer’s account.  … The Wall Street Journal reports that the CEO of an unnamed UK-based energy company thought he was talking on the phone with his boss, the CEO of the German parent company, who’d asked him to urgently transfer €220,000 ($243,000) to a Hungarian supplier. However, the UK CEO was in fact taking instructions from a scammer who’d used AI-powered voice technology to impersonate the German CEO.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will you protect yourself from this?

Join the conversation on our Facebook Page!

Cybersecurity alert: 34% of vulnerabilities found this year remain unpatched

The overall number of reported vulnerabilities in the first half of 2019 has dropped slightly from last year, but risks remain high

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How quickly do you patch fixes to these vulnerabilities?

Join the conversation on our Facebook Page!

 

Wi-Fi 6 Will Be Here Soon. What Is It?

Wi-Fi 6 is the latest generation of wireless connectivity technology. It hasn’t really launched yet, but it will be here this fall, so tech makers have been building support into devices this year as a means of future-proofing their products. Its faster…

Wired.com click the link to read the rest of the story. Our FREE Tools can help!

How soon will you upgrade to wifi6?

Join the conversation on our Facebook Page!

States preparing for ransomware voter assaults

The challenge: lock down the most exposed part of the nation’s election system.  … A ransomware attack in 2020 could prove devastating, preventing voters from registering or poll workers from confirming voter eligibility, officials say.

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you concerned with this threat?

Join the conversation on our Facebook Page!

Ransomware hits hundreds of dentist offices in the US

Hundreds of dental practice offices in the US have had their computers infected with ransomware this week, ZDNet has learned from a source. The incident is another case of a ransomware gang compromising a software provider and using its product to deploy ransomware on customers’ systems.  In this case, the software providers are The Digital Dental Record and PerCSoft…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Was your dentist hit?

Join the conversation on our Facebook Page!

Phishing attacks jump by 21% in latest quarter, says Kaspersky

The number of worldwide phishing attacks detected by Kaspersky hit 129.9 million during the second quarter of 2019, according to a new report from the security vendor.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you been hit this year?

Join the conversation on our Facebook Page!

Ransomware attacks have more than doubled this year

Ransomware attacks have more than doubled this year, as criminals turn to powerful new forms of file-locking malware and additional attack techniques to conduct campaigns that are more lucrative than ever before.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your business been hit?

Join the conversation on our Facebook Page!

Hackers Want $2.5 Million Ransom for Texas Ransomware Attacks

The threat actor behind the coordinated ransomware attack against multiple Texas local governments may have gained access to its computer systems via a third-party software provider.  According to NPR, which first reported the development, the attackers want a collective ransom of $2.5 million. So far, there are no indications the amount has been paid.

TheNextWeb.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if hit by an attack?Join the conversation on our Facebook Page!

Symantec fails to keep up with new industry standards

It seems that six months is not enough for Symantec to get its ducks in a row, as its anti-virus software is unable to handle new security industry standards (SHA-2 signatures), and led to Microsoft withholding updates from certain devices.  In an update note for Windows 7 and Server 2008 R2, Microsoft said that when a device runs any Symantec or Norton antivirus program, and attempts to install an update signed only with SHA-2, the antivirus program blocks or deletes the update during installation, which could make the operating system stop working. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still using Symantec or Norton? Why?

Join the conversation on our Facebook Page!

The Evolution of Russia’s Dark Web

Mention the dark web to security experts and their thoughts necessarily turn to its birthplace—Russia. From simple hack-sharing site origins, Russia’s cybercrime ecosystem has grown to rival that of its government.  Ahead of releasing a report on the topic, Charity Wright, formerly with the NSA, and Ariel Ainhoren, Research Team Leader at IntSights, graciously summarized this evolution for us here at the Black Hat conference. …

PCmag.com click the link to read the rest of the story. Our FREE Tools can help!

Have you explored the dark web?

Join the conversation on our Facebook Page!

Ransomware Attack Hits 20+ Local Governments In Texas

The number of local government entities in Texas affected by a ransomware attack is now up to 23. In a release Saturday afternoon, the Texas Department of Information Resources said the local governments reported the attacks Friday morning. The majority of them are smaller local governments. …The DIR said it is continuing to investigate the origin of the attack, but at the moment believes it came from a “single threat actor.”

Kut.org click the link to read the rest of the story. Our FREE Tools can help!

How safe is your local government?Join the conversation on our Facebook Page!

New cryptojacking malware uses a sneaky trick to remain hidden

A newly-discovered form of cryptocurrency- mining malware is capable of remaining so well-hidden that researchers investigating it found that it had spread to almost every computer at a company that had become infected. … The Monero-cryptomining campaign was uncovered after Varonis’ security platform spotted suspicious network alerts and abnormal file activity on systems within organisations that had reported unstable applications and network slowdown. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Top Windows Defender expert: These are the threats security hasn’t yet solved

More danger lurks around the corner as advanced techniques used by state-backed hackers, for example, to steal information, filter down to financially motivated attackers. This threat applies to the continuing growth of file-less malware, supply-chain attacks, and phishing. “We’re seeing the trend of advanced techniques being used to deliver commodity malware. Once the advanced technique becomes public knowledge…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you confident your computers are viruses free?

Join the conversation on our Facebook Page!

Warshipping: new hack tools shipped to your business

Researchers have described a new technique which could be used by cyber attackers to infiltrate corporate setups — with a little help from your friendly neighborhood delivery workers. … Dubbed warshipping, the technique is the result of the researchers’ investigation into possible infiltration methods through package deliveries to the office mail-room — or an individual victim’s front door. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you found odd electronics in packages to your office?

Join the conversation on our Facebook Page!