U.S. Exposes Massive Chinese Spying Campaign

The threats we face have never been more severe and more pervasive and more potentially damaging to our national security, and no country poses a broader and more severe long-term threat to our nation’s economy and cyber infrastructure than China,” FBI Director Christopher Wray said at a news conference in Washington.

Bloomberg.com click the link to read the rest of the story.

Are you concerned with nation state hacking of your business?Join the conversation on our Facebook Page!

2019 Cyber Security – What to expect next

During 2019 we expect to see an increase… If a sophisticated attack involves not one but five top-notch threats synergistically working together, the defense panorama could become very blurry. Security experts have a recipe for disaster. …

The purchase of cybersecurity has led to expanding attacks that will become more sophisticated in 2019 and beyond. We will continue to influence societal expectations on security, which will trickle down to companies through hundreds of thousands of vulnerable and easy targets for attackers to profit. Driven by many falling victim to feature misconceptions, more will become key targets. Cyber products that provide consolidated feature sets have a hard time understanding each customer’s specific pain points and the bad guys know this.

In 2019, even more high-profile breaches will push the security and privacy, finally. Security is argued about until we die. That’s a particularly terrifying threat.

Medium.com  click the link to read the rest of the story.

Are you ready to face these threats?Join the conversation on our Facebook Page!

Cybersecurity Explained to your Grandparents

After blockchain and Artificial Intelligence, it’s time to become a cybersecurity expert. Cybersecurity is not an easy concept, but it can be understood as a peacekeeper against digital world’s growing threats. The startups in the Cyber@StationF program led by Thales help us get some answers to questions about this mysterious world that you didn’t even think of asking.

Medium.com  click the link to read the rest of the story.

What technology have you needed help explaining?Join the conversation on our Facebook Page!

How My Email Account Got Hacked and the Steps I Took

Warning: this story gets very cringeworthy.

How did I find out? Well I got an email saying that some malicious software had been downloaded on my computer and had obtained some scandalous information about me. The email threatened to release the information they captured if I did not pay them with Bitcoin.

Apparently this is a fairly common email scam that goes around. …

Hackernoon.com  click the link to read the rest of the story.

Has your email been hacked? What did you do?Join the conversation on our Facebook Page!

How to Tell If A Website Is Dangerous

These days it can be very difficult to tell if a site is trustworthy or not. Many nefarious sites are being designed to look respectable. Thus you should always make sure that a site is not dangerous by using multiple approaches. This is especially important to consider before providing a site with sensitive information such as credit card numbers, banking information, your email address, etc…

In general you may want to be wary of a site if it asks you for unnecessary personal information, a credit card number, or a bank number when it’s not necessary.

TechSupportAlert.com click the link to read the rest of the story.

What do you look for before responding to these alerts?Join the conversation on our Facebook Page!

Think You Have Cybersecurity Taken Care Of? Think Again

If you learned that homes with your same model of alarm system were being broken into 32 percent more often this year than last, you might no longer think your system is secure enough. Yet many companies assume their IT infrastructure is still secure, despite the fact that cyberattacks jumped 32 percent between the first quarters of 2017 and 2018…

Forbes.com click the link to read the rest of the story.

When was last time your operation was breached?  Did you even know about it?Join the conversation on our Facebook Page!

Got ransomware? These tools may help

There may be a way to get those files back without paying a ransom. But first a couple of basic questions…

infoworld.com click the link to read the rest of the story.

Have you been hit with ransomware?  How did you recover?Join the conversation on our Facebook Page!

How to spot fake, scam or fraudulent websites

This guide will teach you how to recognize secure websites you can trust and how to spot fake ones run by fraudsters looking to scam you.

comparitech.com click the link to read the rest of the story.

What was the most valuable lesson here for you ?Join the conversation on our Facebook Page!

Identity Theft 101 – What is Identity Theft?

What is identity theft? It is simply when someone uses your identity as their own. But there’s nothing simple at all about the damage left in their wake. There are close to 10 different types of identity theft, which we’ll detail below. …

I will dig into the identity theft basics, including how it happens, some of the most common types of identity theft, and what you can do to protect yourself.

Libertyid.com click the link to read the rest of the story.

Has your identity been stolen?  What happened as a result?Join the conversation on our Facebook Page!

How to Spot and Avoid Fake Virus & Malware Warnings

As you use your computer and browse the Web, you may occasionally run into infection warnings that appear to be legitimate but aren’t. These anti-malware warning messages — appropriately called “scareware” — are designed to scare you into installing fake anti-malware programs that are actually malware in disguise.

So how can you tell between real and fake warning messages? It can be tough, but as long as you stay calm and take your time, there are a few signs you can look for that will help you distinguish between the two.

makeuseof.com click the link to read the rest of the story.

Have you been scammed?Join the conversation on our Facebook Page!

Hackers Aren’t Afraid of Us – This is why

Commander of the United States Cyber Command, Gen. Paul Nakasone was asked whether our adversaries think they will suffer if they strike us with cyberweapons. “They don’t fear us,” General Nakasone replied.  So while the United States remains the greatest cyberpower on earth, it is increasingly losing daily cyberconflicts. The range of American targets is so wide and deep that it is almost impossible to understand all of the vulnerabilities. And because most of those targets don’t belong to the government…

NYTimes.com click the link to read the rest of the story.

Are you concerned that hackers could destroy your business?

Join the conversation on our Facebook Page!

SplitSpectre – new Spectre-like CPU attack discovered

A SplitSpectre attack is far easier to execute than an original Spectre attack. Researchers explain:

Although Spectre v1 is powerful and does not rely on SMT (Simultaneous Multithreading), it requires […] a gadget to be present in the victim’s attack surface. Google Project Zero writes in their original blog post on Spectre v1 [46] that they could not identify such a vulnerable code pattern in the kernel, and instead relied on eBPF (extended Berkeley Packet Filter) to place one there themselves.  In this point lies the strength of our new Spectre v1 variant, SplitSpectre. As its name implies, it splits the Spectre v1gadget into two parts Researchers say the second half of this improved exploitation scenario can be run within the attacker’s own malicious code, instead of the target’s kernel, simplifying the exploitation procedure.

ZDnet.com  click the link to read the rest of the story.

How are you protecting your computers from this attack?Join the conversation on our Facebook Page!

Cybercrime and cyberwar: A spotter’s guide to the groups that are out to get you

The bulk of cybercrime is carried out by the equivalent of real-world opportunist thieves. These are the petty criminals of the online world, the crooks you’re most likely to come across, or at least feel the impact of, as an individual.

ZDnet.com  click the link to read the rest of the story.

Which type of hacker has caused you the most damage?Join the conversation on our Facebook Page!

A Cybersecurity Moonshot – Inside Chronicle & Alphabet and Project Lantern

Fifteen years ago, cybersecurity could be boiled down to a simple strategy: Secure the perimeter. [Today]…

Many businesses use 10, 20 or 30 different security products to protect their systems. They all have advantages, and security practitioners will use different combinations to investigate a potential threat. If a team has access to 15 tools, for instance, one engineer might think to use three of them while another tries a completely different subset. There isn’t enough time to try them all, so experts pick products based on their experience and what they believe will be best suited to the task.

It’s a messy problem that doesn’t have a simple answer.

Engadget.com  click the link to read the rest of the story.

How many layers of cyber security does your business have?Join the conversation on our Facebook Page!

Data Breaches Keep Happening. So Why Don’t You Do Something?

Experts caution that the stream of news about such breaches can set a new normal and instill a sense of fatalism — and complacency — in consumers.

Anthony Vance, an associate professor and director of the Center for Cybersecurity at the Fox School of Business at Temple University, said last year’s breach of information held by the credit reporting company Equifax, which affected 145 million Americans, was “a game-changer.”

The information gleaned could be used to fraudulently open new credit accounts, he said, adding, “That should give even the most jaded American consumer pause and prompt them to do something.”

But evidence suggests that high-profile breaches don’t typically change consumers’ behavior.

NYTimes.com  click the link to read the rest of the story.

What should we do?Join the conversation on our Facebook Page!

How Do Customers View Businesses After a Data Breach?

Nothing can be quite as devastating to a business’s customer base than a data breach.

How do customers perceive businesses after a data breach? What was once a highly-trusted, well-regarded company could be quickly downgraded to an untrustworthy, irresponsible company after a data breach.

RevisionLegal.com  click the link to read the rest of the story.

If you have been breached, what did it cost your firm?Join the conversation on our Facebook Page!

Cybersecurity Is About Much More Than Hacking

There is growing concern among professionals that cybersecurity firms are seriously understaffed, and there aren’t nearly enough of them to combat the growing number of cyberattacks. Making matters worse, the continued drive toward accelerated training programs for software developers means that more developers are deploying code who have not had any formal security training.

Medium.com  click the link to read the rest of the story.

Are you ready for the new security challenges?Join the conversation on our Facebook Page!

How to Shop Online Like a Security Pro

So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online.

Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.

krebsonsecurity.com  click the link to read the rest of the story.

Have you planted your flag, yet?Join the conversation on our Facebook Page!

Why Cyber Monday is just the beginning of the festive hacking season

Attackers will always attempt to go for the low-hanging fruit by targeting individual consumers for a quick payday by clearing out their bank accounts or by selling fake or non-existent goods, but more organised hacking groups will also use the holiday period in an attempt to win bigger scores.

zdnet.com  click the link to read the rest of the story.

How many attacks have you avoided so far, this season?Join the conversation on our Facebook Page!

500K Android users hit with malware, and what to do now

More than half a million Android users installed malware disguised as smartphone games—right from the Google Play store. Mainly posing as a driving game, the malware was found in as many as 13 apps, according to tweets from ESET security researcher Lukas Stefanko.

This is not the first time…

TechRepublic.com  click the link to read the rest of the story.

Did you find an infected app on your phone?Join the conversation on our Facebook Page!

Terrifying new email scam & what to do

People are being victimized by a terrifying new email scam where attackers claim they stole your password and hacked your webcam while you were watching porn — here’s how to protect yourself. The attacker probably took your password from a publicly available database of old leaked passwords and email addresses.

BusinessInsider.com  click the link to read the rest of the story.

I have seen this, have you?Join the conversation on our Facebook Page!

Researchers discover seven new Meltdown and Spectre attacks

A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees.

Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995.

zdnet.com  click the link to read the rest of the story.

How are you protecting your business from this?Join the conversation on our Facebook Page!

The New Cryptojacking: Victims’ Computers Mine Cryptocurrency

Computers infected with cryptojacking malware run much slower, and often victims are not even aware that their computers are being attacked, as “coin mining” malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation.

Forbes.com  click the link to read the rest of the story.

Want to have your computers checked?Join the conversation on our Facebook Page!

Why WannaCry ransomware is still a threat to your PC

WannaCry tops the list of the most widespread cryptor families, with attempted attacks against 74,621 of the security firm’s users across the globe between July and September.  WannaCry ransomware attacks have risen as proportion of the total attack compared with the same period last year: in Q3 2017

zdnet.com  click the link to read the rest of the story.

Is your business protected?Join the conversation on our Facebook Page!

Why ransomware costs small businesses big money

About 22% of businesses with less than 1,000 employees that experienced a ransomware attack in the last year had to stop business operations immediately. About 15% lost revenue.

On average, small companies lost over $100,000 per ransomware incident due to downtime. For one in six organizations, these attacks caused 25 hours or more of downtime.

cnn.com  click the link to read the rest of the story.

How much would it cost your business to be down for several days?Join the conversation on our Facebook Page!

23 Social Engineering Attacks You Need To Shut Down

A social engineering attack is an orchestrated campaign against employees at either a variety of companies or one high valued business using a variety of digital, in-person or over the phone techniques to steal intellectual property, credentials or money.

Hackers prefer social engineering because it’s much easier to hack a human than a business. Social engineering attacks allow the hacker to combine multiple efforts and even cover their tracks, because they can use the human to take money or install malware under their persona.

smartfile.com  click the link to read the rest of the story.

How well trained is your team to deal with social engineering attacks?Join the conversation on our Facebook Page!

A New Threat to Your Finances: Cell-Phone Account Fraud

Consumers have a new privacy threat to worry about. It’s known as cell-phone account fraud, where crooks open up a phony cell-phone account in your name and use it to access your bank account, sign up for credit cards, or sell the phone number for other criminals to use.

While little known among consumers, cell-phone account fraud can have a devastating impact on your finances—and your reputation.

consumerreports.com  click the link to read the rest of the story.

Have you been hit with this scam?Join the conversation on our Facebook Page!

Ransomware shuts down 1 in 5 small businesses after it hits

When businesses are hit with ransomware, it’s not just the ransom amount that could financially hurt. The time spent trying to get systems back online and potential revenue lost in the meantime makes a lasting impact, too.

cnn.com  click the link to read the rest of the story.

What would it cost your business to be shut down for days?Join the conversation on our Facebook Page!

Even After Multiple Cyberattacks, Many Businesses Fail to Bolster Security. Here’s What You Need to Do

Small businesses suffered a barrage of computer invasions last year but most took no action to shore up their security afterward, according to a survey by insurer Hiscox.  It found that 47 percent of small businesses reported that they had one attack in 2017, and 44 percent said they had two to four attacks.  The invasions included ransomware, which makes a computer’s files unusable unless the device’s user or owner pays a ransom…

inc.com  click the link to read the rest of the story.

How many times have you been attacked?Join the conversation on our Facebook Page!

OK, panic—newly evolved ransomware is bad news for everyone

There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range of organizations over the past few months. While most of the reported incidents of data being held hostage have purportedly involved a careless click by an individual on an e-mail attachment, an emerging class of criminals with slightly greater skill has turned ransomware into a sure way to cash in on just about any network intrusion.
And that means that there’s now a financial incentive for going after just about anything. While the payoff of going after businesses’ networks used to depend on the long play—working deep into the network, finding and packaging data, smuggling it back out—ransomware attacks don’t require that level of sophistication today. It’s now much easier to convert hacks into cash.

arstechnica.com  click the link to read the rest of the story.

How are you protecting yourself from ransomware?Join the conversation on our Facebook Page!