Is It Really Possible to Use the Internet Privately?

According to USA Today, 75% of the world’s most popular websites have tracking code on their pages. I am not alone in my concern about maintaining some sort of privacy online.

Hackernoon.com click the link to read the rest of the story.

Are you concerned with about internet privacy?Join the conversation on our Facebook Page!

Beware: Hackers are trying to scam your company with this attack

Criminals use BEC attacks to gain access to a business email account and pretend to be the account owner to defraud the company and its employees, customers, or partners, the report noted. Scammers typically target employees with access to company finances or payroll data, and other personally identifiable information (PII).

TechRepublic.com click the link to read the rest of the story.

Has your firm had an BEC attack?Join the conversation on our Facebook Page!

Hackers steal more than $1M from global economy in a single minute: analysis

Approximately 1,861 people fall victim to cyberattacks in a span of 60 seconds, while some $1.14 million is stolen, cybersecurity firm RiskIQ found.

TheHill.com click the link to read the rest of the story.

Has your business been hacked?Join the conversation on our Facebook Page!

Password and Credential Management in 2018

Many people will read the headline and probably think: “No, not another piece of advice that I should hash passwords — uh”. But stop. You’ll learn a lot more here. Promised.

We will cover the “perfect” (Nothing is absolutely perfect and of course I would be more than happy for any suggestions for improvements in the comments ?) way to handle password credentials

Medium.com click the link to read the rest of the story.

Are your passwords protected?Join the conversation on our Facebook Page!

A quick introduction to web security

There are many reasons to learn about web security:

  • You’re a concerned user that is worried about your personal data being leaked
  • You are a concerned web developer that wants to make their web app secure
  • You are a web developer going through an interview process

and so on.

The purpose of this post is to explain common web security acronyms in a way that is easy to understand but still accurate.

FreeCodeCamp.org click the link to read the rest of the story.

How many layers of security do you have on your website?Join the conversation on our Facebook Page!

Gmail’s ‘Confidential Mode’ arrives on mobile devices

Once you’ve turned on confidential mode for a specific email, you can set an expiration date and passcode so that you can restrict access to the email either in the web interface or via SMS. Recipients of these confidential emails won’t be able to copy, paste, download, print or forward the message, and attachments will be disabled.

That doesn’t stop anyone from taking a screenshot of your message, however.


engaget.com click the link to read the rest of the story.

Will you use this feature?Join the conversation on our Facebook Page!

How To Survive A Ransomware Attack — And Not Get Hit Again

Ransomware comes in two types. The first encrypts the files on a computer or network; the second locks a user’s screen. “Some ransomware will also act like a worm – as was the case with WannaCry – and once inside a network, will spread laterally to other machines without interaction by the attacker or the infected user,” says a NCSC spokesman.

Forbes.com click the link to read the rest of the story.

Did you know that a new generation of antivirus programs also solve this problem?Join the conversation on our Facebook Page!

The next 50 years of cyber security

Observable gaps prevent our industry from operating in a rational, scientific and organized way. I think that the information security industry is currently stalling due to:

  1. A lack of classification methods around the root causes of breaches.
  2. A lack of transparency into the root causes of data breaches.
  3. A lack of probabilistic methods for those who practice cyber security.

Only a collective drive from this industry and its communities toward quantifiable methods and goals will allow us to build a future we’re proud of.

TheMedium.com click the link to read the rest of the story.

Are you concerned about the future of cyber security?Join the conversation on our Facebook Page!

The Pandora’s Box of the Digital Age

In the past year alone, a series of hacks and ransomware attacks by hostile governments and other malign actors have raised alarms about a major threat to global stability. Unfortunately, many governments are responding by developing still more cyber weapons, on the mistaken assumption that offense is the best defense.

Project-Syndicate.org click the link to read the rest of the story.

Should nation states focus on offensive strategies?Join the conversation on our Facebook Page!

Apple iOS Users Targeted By New Exploit

The scam starts with an email informing users that their phones have been locked due to “illegal activity” and instructing them to call “Apple Care” to get the problem fixed.

DWPia.com click the link to read the rest of the story.

Have you received these emails?Join the conversation on our Facebook Page!

Why Nation-State Hacking Should Matter To Everyone

Perhaps most critical, particularly for business networks who also support employee or consumer devices, is to ensure every device receives these necessary updates and patches. One vulnerable entry point can spell the downfall of an entire organization or a household of connected devices.

Forbes.com click the link to read the rest of the story.

Are you considering purchasing one?
Join the conversation on our Facebook Page!

Security Spending is Up – But on Old Technologies that Don’t Work

Most organizations are spending their increased dollars on the same type of solutions that they implemented in the past. But these legacy solutions are no longer effective at preventing modern breaches. Today’s attackers use new methods that old security systems don’t detect.

lastline.com learn more here

Are you certain your current security technologies deserve your trust?
Join the conversation on our Facebook Page! 

DeepLocker: will malware weaponize artificial intelligence?

Traditional cyber security solutions, such as bolt-on antivirus software, are no longer enough. Cyber attackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.

PCMag.com learn more here

Are you adding new layers of protection for your business?
Join the conversation on our Facebook Page! 

Cybersecurity Starts at the Top

The truth is that the threat posed by cyber security breaches is both acute and avoidable. The key to mitigating it is to understand that cyber security isn’t simply a technology issue; it is also an urgent strategic issue that should be at the top of the agenda for every board and management team.

LiveMint.com learn more here

How seriously do you take Cyber-Security?
Join the conversation on our Facebook Page! 

PC Maintenance is cheaper and safer. A few reasons why.

How much do you think it costs you, NOT to maintain your PC?

Now you can secure and maintain your computers and gain peace of mind for less. Learn More Here

IngeniousGeeks.com learn more here

How much do you think it costs you, NOT to maintain your PC?
Join the conversation on our Facebook Page! 

Google now has a Cybersecurity Company, Chronicle

Chronicle will initially offer two services: The VirusTotal anti-malware intelligence service, and a cybersecurity intelligence and analytics platform.

Inc.com click the link to read the rest of the story?

What do you think of Google’s entry into the world of Cyber Security offerings?
Join the conversation on our Facebook Page! 

In 2017 only 2% of small businesses actually secured their systems with proper protection.

Find out why and what they can do about it.

You can secure and maintain your computers yourself and gain peace of mind for less. https://bit.ly/2Li84sy

 

IngeniousGeeks.com learn more here

Are you still using 20th Century technology to keep your computer safe?
Join the conversation on our Facebook Page! 

Starting at $40, hackers can attack your business

Major cyber incidents have increased by 32% between Q1 2017 and Q1 2018…

Here are the costs of different cybercrime services:

  • Hacking email: $40
  • DDoS attack: $50
  • Hacking website: $150
  • Stealing payment data $270
  • Infecting with Trojan for mining: $300
  • Infecting with ransomware Trojan: $750
  • Stealing from ATM: $1,500
  • Targeted attack: $4,500

TechRepublic.com click the link to read the rest of the story?

Do you worry about competitors using these services against you?
Join the conversation on our Facebook Page! 

Cyber threats are targeting small businesses

Just how big is the risk to small business? Big, very big. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, up from the previous year’s 53%.

USAToday.com click the link to read the rest of the story?

Has your business survived a security breach?
Join the conversation on our Facebook Page! 

Invisible threats to old-school endpoint protection software

Fileless security threats—also known as “non-malware” attacks—leverage RAM, the Windows system registry, and even PowerShell and the Windows Management Instrumentation (WMI) module to kick off multi step “attack chains.”

ChannelProNetwork.com click the link to read the rest of the story?

How are you dealing with file-less attacks?
Join the conversation on our Facebook Page! 

U.S. intel chief warns of devastating cyber threat to U.S.

The U.S. intelligence chief warned on Friday that the threat was growing for a devastating cyber assault on critical U.S. infrastructure, saying the “warning lights are blinking red again” nearly two decades after the Sept. 11, 2001, attacks.

Yahoo.com click the link to read the rest of the story?

Could your business survive such an attack?
Join the conversation on our Facebook Page! 

WPA3 Wi-Fi is here, and it’s harder to hack

New Wi-Fi routers will come with stronger protections for the data that flows between your computers, phones or smart home devices and your internet connection. It will also boost security in workplace

Cnet.com click the link to read the rest of the story.

Are you ready to switch to WPA3?
Join the conversation on our Facebook Page!

Your Wi-Fi Security Is Probably Weak. Here’s How to Fix That.

If your router is infected with malicious software, all your internet-connected devices become vulnerable, including your smartphone, computer, smart watch, television and Amazon Echo.

NY Times.com click the link to read the rest of the story.

How old is your router?
Join the conversation on our Facebook Page!