The fileless attack: Hacking without installing software

Cyber criminals don’t need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.  “We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things with our defenses, either network-wise or at the end point.” The attacks that Lentz is worried about are fileless attacks, also known as zero-footprint attacks, macro, or non-malware attacks. These types of attacks don’t install new software on a user’s computer, so antivirus tools are more likely to miss them.

csoonline.com click the link to read the rest of the story.

Are you certain your security software detect these?Join the conversation on our Facebook Page!

The top 10 cyberthreats IT security teams are facing right now

IT and security professionals surveyed said they were either highly concerned or extremely concerned about the following cyberthreats, the report found:

TechRepublic.com click the link to read the rest of the story.

What has been the greatest threat to your business?Join the conversation on our Facebook Page!

The WannaCry virus was just the beginning

WannaCry swept around the globe in what may have been the most extensive cyber attack in history. The ransomware, which gets its name from how it held a user’s data hostage, affected at least 200 000 computers in more than 150 countries, disrupting the operations of FedEx, Renault-Nissan, Russia’s interior ministry, Chinese universities, and the UK’s National Health Service (NHS).

Medium.com click the link to read the rest of the story.

Are you prepared?
Join the conversation on our Facebook Page!

Online security 101: Tips for protecting your privacy from hackers and spies

People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop.


Zdnet.com click the link to read the rest of the story.

Do you still care about your privacy?Join the conversation on our Facebook Page!

Hackers steal more than $1M from global economy in a single minute: analysis

Approximately 1,861 people fall victim to cyberattacks in a span of 60 seconds, while some $1.14 million is stolen, cybersecurity firm RiskIQ found.

TheHill.com click the link to read the rest of the story.

Has your business been hacked?Join the conversation on our Facebook Page!

How To Survive A Ransomware Attack — And Not Get Hit Again

Ransomware comes in two types. The first encrypts the files on a computer or network; the second locks a user’s screen. “Some ransomware will also act like a worm – as was the case with WannaCry – and once inside a network, will spread laterally to other machines without interaction by the attacker or the infected user,” says a NCSC spokesman.

Forbes.com click the link to read the rest of the story.

Did you know that a new generation of antivirus programs also solve this problem?Join the conversation on our Facebook Page!

Antivirus Detects Fewer Than Half of Cyberattacks

Traditional tools are no longer sufficient to detect cyberattacks, the data shows: Antivirus systems only detected endpoint compromise 47% of the time; other attacks were caught through automated SIEM alerts (32%) and endpoint detection and response platforms (26%).

Darkreading.com click the link to read the rest of the story.

Are you implementing a next gen antivirus solution?
Join the conversation on our Facebook Page!

 

Why Nation-State Hacking Should Matter To Everyone

Perhaps most critical, particularly for business networks who also support employee or consumer devices, is to ensure every device receives these necessary updates and patches. One vulnerable entry point can spell the downfall of an entire organization or a household of connected devices.

Forbes.com click the link to read the rest of the story.

Are you considering purchasing one?
Join the conversation on our Facebook Page!

Security Spending is Up – But on Old Technologies that Don’t Work

Most organizations are spending their increased dollars on the same type of solutions that they implemented in the past. But these legacy solutions are no longer effective at preventing modern breaches. Today’s attackers use new methods that old security systems don’t detect.

lastline.com learn more here

Are you certain your current security technologies deserve your trust?
Join the conversation on our Facebook Page! 

DeepLocker: will malware weaponize artificial intelligence?

Traditional cyber security solutions, such as bolt-on antivirus software, are no longer enough. Cyber attackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.

PCMag.com learn more here

Are you adding new layers of protection for your business?
Join the conversation on our Facebook Page! 

Cybersecurity Starts at the Top

The truth is that the threat posed by cyber security breaches is both acute and avoidable. The key to mitigating it is to understand that cyber security isn’t simply a technology issue; it is also an urgent strategic issue that should be at the top of the agenda for every board and management team.

LiveMint.com learn more here

How seriously do you take Cyber-Security?
Join the conversation on our Facebook Page! 

PC Maintenance is cheaper and safer. A few reasons why.

How much do you think it costs you, NOT to maintain your PC?

Now you can secure and maintain your computers and gain peace of mind for less. Learn More Here

IngeniousGeeks.com learn more here

How much do you think it costs you, NOT to maintain your PC?
Join the conversation on our Facebook Page! 

In 2017 only 2% of small businesses actually secured their systems with proper protection.

Find out why and what they can do about it.

You can secure and maintain your computers yourself and gain peace of mind for less. https://bit.ly/2Li84sy

 

IngeniousGeeks.com learn more here

Are you still using 20th Century technology to keep your computer safe?
Join the conversation on our Facebook Page! 

Cyber threats are targeting small businesses

Just how big is the risk to small business? Big, very big. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, up from the previous year’s 53%.

USAToday.com click the link to read the rest of the story?

Has your business survived a security breach?
Join the conversation on our Facebook Page! 

5 new cyberthreats pop up every second, here’s how to protect yourself

The rapid growth suggests that cyber criminals are drawn to the ease of infecting a user’s system and collecting the payments…

Techrepublic.com click the link to read the rest of the story?

How are you protecting yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Ransomware: An executive guide to one of the biggest menaces on the web

Everything you need to know about ransomware: how it started, why it’s booming, how to protect against it, and what to do if your PC’s infected.

zdnet.com click the link to read the rest of the story.?

What have you done to protect yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Your Wi-Fi Security Is Probably Weak. Here’s How to Fix That.

If your router is infected with malicious software, all your internet-connected devices become vulnerable, including your smartphone, computer, smart watch, television and Amazon Echo.

NY Times.com click the link to read the rest of the story.

How old is your router?
Join the conversation on our Facebook Page!

This is how it feels to face a major cyber attack

Intense, stressful, petrifying: those are just some of the words used to describe what it was to be at the center of some of the biggest and most high profile cyber attacks to take place over the last year.

ZDNET Click the link to read the rest of the story.

Has your business been crippled in a Cyber Attack?

Join the conversation on our Facebook Page!