How to Shop Online Like a Security Pro

So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online.

Adopting a shopping strategy of simply buying from the online merchant with the lowest advertised prices can be a bit like playing Russian Roulette with your wallet, for the simple reason that there are tons of completely fake e-commerce sites out there looking to separate the unwary from their credit card details.

krebsonsecurity.com  click the link to read the rest of the story.

Have you planted your flag, yet?Join the conversation on our Facebook Page!

Why Cyber Monday is just the beginning of the festive hacking season

Attackers will always attempt to go for the low-hanging fruit by targeting individual consumers for a quick payday by clearing out their bank accounts or by selling fake or non-existent goods, but more organised hacking groups will also use the holiday period in an attempt to win bigger scores.

zdnet.com  click the link to read the rest of the story.

How many attacks have you avoided so far, this season?Join the conversation on our Facebook Page!

500K Android users hit with malware, and what to do now

More than half a million Android users installed malware disguised as smartphone games—right from the Google Play store. Mainly posing as a driving game, the malware was found in as many as 13 apps, according to tweets from ESET security researcher Lukas Stefanko.

This is not the first time…

TechRepublic.com  click the link to read the rest of the story.

Did you find an infected app on your phone?Join the conversation on our Facebook Page!

Terrifying new email scam & what to do

People are being victimized by a terrifying new email scam where attackers claim they stole your password and hacked your webcam while you were watching porn — here’s how to protect yourself. The attacker probably took your password from a publicly available database of old leaked passwords and email addresses.

BusinessInsider.com  click the link to read the rest of the story.

I have seen this, have you?Join the conversation on our Facebook Page!

Researchers discover seven new Meltdown and Spectre attacks

A team of nine academics has revealed today seven new CPU attacks. The seven impact AMD, ARM, and Intel CPUs to various degrees.

Two of the seven new attacks are variations of the Meltdown attack, while the other five are variations on the original Spectre attack — two well-known attacks that have been revealed at the start of the year and found to impact CPUs models going back to 1995.

zdnet.com  click the link to read the rest of the story.

How are you protecting your business from this?Join the conversation on our Facebook Page!

The New Cryptojacking: Victims’ Computers Mine Cryptocurrency

Computers infected with cryptojacking malware run much slower, and often victims are not even aware that their computers are being attacked, as “coin mining” malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation.

Forbes.com  click the link to read the rest of the story.

Want to have your computers checked?Join the conversation on our Facebook Page!

Why WannaCry ransomware is still a threat to your PC

WannaCry tops the list of the most widespread cryptor families, with attempted attacks against 74,621 of the security firm’s users across the globe between July and September.  WannaCry ransomware attacks have risen as proportion of the total attack compared with the same period last year: in Q3 2017

zdnet.com  click the link to read the rest of the story.

Is your business protected?Join the conversation on our Facebook Page!

Why ransomware costs small businesses big money

About 22% of businesses with less than 1,000 employees that experienced a ransomware attack in the last year had to stop business operations immediately. About 15% lost revenue.

On average, small companies lost over $100,000 per ransomware incident due to downtime. For one in six organizations, these attacks caused 25 hours or more of downtime.

cnn.com  click the link to read the rest of the story.

How much would it cost your business to be down for several days?Join the conversation on our Facebook Page!

23 Social Engineering Attacks You Need To Shut Down

A social engineering attack is an orchestrated campaign against employees at either a variety of companies or one high valued business using a variety of digital, in-person or over the phone techniques to steal intellectual property, credentials or money.

Hackers prefer social engineering because it’s much easier to hack a human than a business. Social engineering attacks allow the hacker to combine multiple efforts and even cover their tracks, because they can use the human to take money or install malware under their persona.

smartfile.com  click the link to read the rest of the story.

How well trained is your team to deal with social engineering attacks?Join the conversation on our Facebook Page!

Ransomware shuts down 1 in 5 small businesses after it hits

When businesses are hit with ransomware, it’s not just the ransom amount that could financially hurt. The time spent trying to get systems back online and potential revenue lost in the meantime makes a lasting impact, too.

cnn.com  click the link to read the rest of the story.

What would it cost your business to be shut down for days?Join the conversation on our Facebook Page!

Even After Multiple Cyberattacks, Many Businesses Fail to Bolster Security. Here’s What You Need to Do

Small businesses suffered a barrage of computer invasions last year but most took no action to shore up their security afterward, according to a survey by insurer Hiscox.  It found that 47 percent of small businesses reported that they had one attack in 2017, and 44 percent said they had two to four attacks.  The invasions included ransomware, which makes a computer’s files unusable unless the device’s user or owner pays a ransom…

inc.com  click the link to read the rest of the story.

How many times have you been attacked?Join the conversation on our Facebook Page!

OK, panic—newly evolved ransomware is bad news for everyone

There’s something inherently world-changing about the latest round of crypto-ransomware that has been hitting a wide range of organizations over the past few months. While most of the reported incidents of data being held hostage have purportedly involved a careless click by an individual on an e-mail attachment, an emerging class of criminals with slightly greater skill has turned ransomware into a sure way to cash in on just about any network intrusion.
And that means that there’s now a financial incentive for going after just about anything. While the payoff of going after businesses’ networks used to depend on the long play—working deep into the network, finding and packaging data, smuggling it back out—ransomware attacks don’t require that level of sophistication today. It’s now much easier to convert hacks into cash.

arstechnica.com  click the link to read the rest of the story.

How are you protecting yourself from ransomware?Join the conversation on our Facebook Page!

5 Unexpected Ransomware Attacks You need to know

Ransomware attacks are proliferating unimaginably. Coming year might come along with some more serious threats. We hope security researchers come up with sure solutions for these robust malware program and innocent users aren’t harmed anymore.

Above all, we highly recommend all user to take offline backup of their data. Even if they are attacked with any such attack, they won’t end up becoming a victim.

SysTweak.com  click the link to read the rest of the story.

Have you seen any of these attacks?Join the conversation on our Facebook Page!

China to Control the Internet of Things to Spy on Business?

China is aggressively seeking to dominate the Internet of Things and plans to use access to billions of networked electronic devices for intelligence-gathering, sabotage, and business purposes, according to a forthcoming congressional report.

Freebeacon.com  click the link to read the rest of the story.

Do you really think your business is safe from this?Join the conversation on our Facebook Page!

12 signs you’ve been hacked — and how to fight back

Here are 12 sure signs you’ve been hacked and what to do in the event of compromise. Note that in all cases, the number 1 recommendation is to completely restore your system to a known good state before proceeding.

csoonline.com  click the link to read the rest of the story.

Have you been hacked? What did you do?Join the conversation on our Facebook Page!

Huawei accused of scheme to steal semiconductor technology from US start-up

A former Huawei employee has accused the company of trying to steal intellectual property in order to help China achieve technological dominance over the US by using a lawsuit against his Silicon Valley start-up.

scmp.com click the link to read the rest of the story.

Are you concerned about ip theft?Join the conversation on our Facebook Page!

Your computer could be quietly mining bitcoin — for someone else

Hackers are quietly hijacking personal computers, company servers, cable routers, mobile devices and other forms of computing power to stealthily mine cryptocurrencies — a problem that cybersecurity experts warn is growing rapidly.  The act, known as cryptojacking…

NBCnews.com click the link to read the rest of the story.

Has your computer started to act strangely slow?Join the conversation on our Facebook Page!

Cybercriminals Know Most Small Businesses Lack Cybersecurity

Could your business recover from an abrupt loss of $256,000? Because that’s how much a single cybersecurity hack could cost a small business, according to a recent analysis in Tech Republic.

entrepreneur.com click the link to read the rest of the story.

Have you invested in cybersecurity for your business?Join the conversation on our Facebook Page!

The fileless attack: Hacking without installing software

Cyber criminals don’t need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.  “We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These types of attacks don’t install new software on a user’s computer, so antivirus tools are more likely to miss them.

csoonline.com click the link to read the rest of the story.

Are you certain your security software detect these?Join the conversation on our Facebook Page!

This cryptojacking mining malware pretends to be a Flash update

Crooks are attempting to spread their cryptojacking malware to unsuspecting victims by disguising it as an update for Flash.  This particular mining operation is thought to have been operating since August this year with a big spike in activity in September and looks to trick potential victims into downloading an XMRig cryptocurrency miner — the malicious software runs in the background and secretly uses the power of the infected PC to acquire Monero for the hackers.

ZDnet.com click the link to read the rest of the story.

Could you have this malware on your computer and not know it?Join the conversation on our Facebook Page!

The top 10 cyberthreats IT security teams are facing right now

IT and security professionals surveyed said they were either highly concerned or extremely concerned about the following cyberthreats, the report found:

TechRepublic.com click the link to read the rest of the story.

What has been the greatest threat to your business?Join the conversation on our Facebook Page!

8 Smart Ways To Maintain Your Digital Privacy

Regardless of how you use the internet, it’s nearly guaranteed that you are being tracked in some way. Natalie Triedman recently shared how people, often unknowingly, are sharing their location. We aren’t saying that you should freak out and stop using the internet, but it’s a good idea to be smart about your browsing.

Follow these tips to start protecting your information online. We’ve included some quick steps that everyone can do, as well as some more difficult and advanced methods for keeping your web data secure.

Hackernoon.com click the link to read the rest of the story.

Are you concerned about your browser tracking you?Join the conversation on our Facebook Page!

The WannaCry virus was just the beginning

WannaCry swept around the globe in what may have been the most extensive cyber attack in history. The ransomware, which gets its name from how it held a user’s data hostage, affected at least 200 000 computers in more than 150 countries, disrupting the operations of FedEx, Renault-Nissan, Russia’s interior ministry, Chinese universities, and the UK’s National Health Service (NHS).

Medium.com click the link to read the rest of the story.

Are you prepared?
Join the conversation on our Facebook Page!

The Complete Guide to Avoiding (and Removing) Windows Crapware

In simple terms, crapware is software you don’t want, but—for one reason or another—gets installed on your system against your will. This can range from legitimate programs that come pre-installed (like Netflix or a trial of McAfee Antivirus) to browser toolbars, auto-starting apps, or something that changes your default search engine.

Lifehacker.com click the link to read the rest of the story.

Have you removed crapware off of your computer?Join the conversation on our Facebook Page!

Hackers steal more than $1M from global economy in a single minute: analysis

Approximately 1,861 people fall victim to cyberattacks in a span of 60 seconds, while some $1.14 million is stolen, cybersecurity firm RiskIQ found.

TheHill.com click the link to read the rest of the story.

Has your business been hacked?Join the conversation on our Facebook Page!

How To Survive A Ransomware Attack — And Not Get Hit Again

Ransomware comes in two types. The first encrypts the files on a computer or network; the second locks a user’s screen. “Some ransomware will also act like a worm – as was the case with WannaCry – and once inside a network, will spread laterally to other machines without interaction by the attacker or the infected user,” says a NCSC spokesman.

Forbes.com click the link to read the rest of the story.

Did you know that a new generation of antivirus programs also solve this problem?Join the conversation on our Facebook Page!

The Pandora’s Box of the Digital Age

In the past year alone, a series of hacks and ransomware attacks by hostile governments and other malign actors have raised alarms about a major threat to global stability. Unfortunately, many governments are responding by developing still more cyber weapons, on the mistaken assumption that offense is the best defense.

Project-Syndicate.org click the link to read the rest of the story.

Should nation states focus on offensive strategies?Join the conversation on our Facebook Page!

Antivirus Detects Fewer Than Half of Cyberattacks

Traditional tools are no longer sufficient to detect cyberattacks, the data shows: Antivirus systems only detected endpoint compromise 47% of the time; other attacks were caught through automated SIEM alerts (32%) and endpoint detection and response platforms (26%).

Darkreading.com click the link to read the rest of the story.

Are you implementing a next gen antivirus solution?
Join the conversation on our Facebook Page!

 

Why Nation-State Hacking Should Matter To Everyone

Perhaps most critical, particularly for business networks who also support employee or consumer devices, is to ensure every device receives these necessary updates and patches. One vulnerable entry point can spell the downfall of an entire organization or a household of connected devices.

Forbes.com click the link to read the rest of the story.

Are you considering purchasing one?
Join the conversation on our Facebook Page!