What is cyberwar? Everything you need to know about the frightening future of digital conflict

Cyberwarfare could turn every gadget you own into a weapon on a virtual battlefield. And the damage will be felt in the real world.  Cyberwarfare refers to the use of digital attacks — like computer viruses and hacking — by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction. Future wars will see hackers using computer code to attack an enemy’s infrastructure, fighting alongside troops using conventional weapons like guns and missiles.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are we ready for an all out cyber war?

Join the conversation on our Facebook Page!

European mobile traffic was recently routed to China

For more than two hours on Thursday, June 6, a large chunk of European mobile traffic was rerouted through the infrastructure of China Telecom, China’s third-largest telco and internet service provider (ISP). … …But if any other ISP would have caused this incident, it would have likely been ignored. Alas, it was China Telecom, and there’s a backstory.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you think we should be concerned by this?

Join the conversation on our Facebook Page!

Cybersecurity: You’re are over-confident or under-prepared for a breach

Sixty eight percent of people believe they’re doing all they can to protect themselves against cyberattacks.  …Perhaps surprisingly, it’s the older generations which has more confidence about how they’re protecting themselves online, with three quarters of those over 45 confident that they’re doing all they can to protect against data loss. …the higher confidence among older web users could be based on a naivety about the malicious threats that are out there on the internet, while younger users are aware of cybersecurity issues – but still aren’t addressing them.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How confident are you that your security is sufficient?

Join the conversation on our Facebook Page!

How hackers make money from your stolen medical data

The most expensive offering on the market is provider information which can be used to forge a medical background, an alarming prospect given the harm which could be done when someone who hasn’t qualified poses as a medical professional. … The cybersecurity firm also found a vast array of forgeries available and for sale. For between $10 and $120 per record, you can buy fake prescriptions, labels, sales receipts, and stolen healthcare cards.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your healthcare info been stolen? What was the result?

Join the conversation on our Facebook Page!

How to Set Up a Secure Phone

I’d advise the following ground rules to best prepare for doing battle against an unseen and dangerous foe.  Purchase a second smartphone as your secure communication device. If you’re on a budget, buy an older, used model from a reputable source. … Use your main smartphone for all of life’s normal, unsecured stuff like social media, email, online shopping, and casual text messages; ONLY use your second smartphone for secure communication — nothing else.  Ensure your second device an iOS device.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you carry two phones?

Join the conversation on our Facebook Page!

This is how we might finally replace passwords

Here’s the thing about passwords: They’re terrible. Passwords are easy to hack, easy to lose and hard to use.

Worse still, passwords guard some of our most valuable digital assets.

Cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you ready for alternatives to passwords?

Join the conversation on our Facebook Page!

Will VPNs Become Obsolete In 2019?

If you just want your passwords and banking information to stay secure, then a VPN is already obsolete. HTTPS keeps your passwords and other information inaccessible for hackers by utilizing strong encryption, no VPN required. However, if you want privacy, you’ll need a VPN.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a VPN?

Join the conversation on our Facebook Page!

The Weaponization Of Artificial Intelligence

In the competition to lead the emerging technology race and the futuristic warfare battleground, artificial intelligence (AI) is rapidly becoming the center of the global power play.

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What should we do?

Join the conversation on our Facebook Page!

The Unbelievable Demand for Cybersecurity Workers

Postings for cybersecurity had grown more than three times faster than other information technology (IT) positions and roughly 12 times faster than all other jobs. … There’s good reason behind the growth: Cybercrime caused an estimated $3 trillion in damages in 2015, according to research firm Cybersecurity Ventures. The company expects that figure to double to $6 trillion by 2021.

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Are you having problems finding security help?

Join the conversation on our Facebook Page!

Wyze Sense review: Wyze continues its ‘too good to be true’ approach

Wyze, a company known for its inexpensive home security cameras that deliver far more than the $20 or $30 asking price, recently expanded its product lineup to include two different sensors.

The $20 Wyze Sense bundle includes a Sense Bridge, two Contact Sensors, and a Motion Sensor. Perhaps what’s more impressive than the small price, is just how small the sensors are themselves. From the Bridge to the Motion Sensor, everything in the kit is compact. I’ve spent a few weeks with the starter kit, and I have to say, Wyze has done it again. …

ZDNet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use a Wyze Camera?Join the conversation on our Facebook Page!

Intel CPUs vulnerable to the new Zombieload attack

Academics have discovered a new class of vulnerabilities in Intel processors that can allow attackers to retrieve data being processed inside a CPU.  The leading attack in this new vulnerability class is a security flaw named Zombieload… academics say that all Intel CPUs released since 2011 are most likely vulnerable. Processors for desktops, laptops, and (cloud) servers are all impacted

ZDNet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you still use Intel chips?Join the conversation on our Facebook Page!

The End of App Stores Is Fast Approaching

A new generation of Progressive Web Applications (PWAs), now taking root on desktop computers, may soon make the jump to your smartphone, changing how you download apps — and where they come from — forever.

Onezero.Medium.com click the link to read the rest of the story.

Is it time for the end of the app store?

Join the conversation on our Facebook Page!

Major Antivirus companies secrets being sold on dark web

A collective of Russian and English-speaking hackers are actively marketing the spoils of data breaches at three US-based antivirus software vendors. The collective, calling itself “Fxmsp,” is selling both source code and network access to the companies for $300,000 and is providing samples that show strong evidence of the validity of its claims. …

Arstechnica.com click the link to read the rest of the story. Our FREE Tools can help!

How much trust do you have in your Antivirus program to protect you?

Join the conversation on our Facebook Page!

How to secure your iPhone or iPad from hackers, snoopers, and thieves

Chances are high that your iPhone or iPad is an absolute treasure trove of personal information that you don’t want falling into the hands of others. And while iOS does a great job of keeping data safe, it’s possible to make the device a lot more secure.

Here are settings you should check (and change) and tweaks you should make to harden the security and lock down your device.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you hardened your iPhone from threats?

Join the conversation on our Facebook Page!

Microsoft: We promise you’ll get better controls over your data

Microsoft on Tuesday announced that it will change how it collects data from devices when customers use its services, introducing the new ‘required’ and ‘optional’ categories for data collected, say, when enterprise customers use Office 365.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

What do you think about this change?

Join the conversation on our Facebook Page!

Microsoft: WinRAR exploit gives attackers ‘full control’ of your PC

When this attack was detected by Microsoft, it’s likely a large chunk of the world’s 500 million WinRAR users hadn’t updated… Israeli security firm Check Point revealed that a malicious ACE file could place malware anywhere on a Windows PC after being extracted by WinRAR. The social engineering used in the campaign was crafted to ensure full remote compromise of a machine

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you use Winrar?

Join the conversation on our Facebook Page!

Cloud database leaked private details of 80 million US families

The addresses and demographic details of more than 80 million US households were exposed on an unsecured database stored on the cloud, independent security researchers have found.  The details included names, ages and genders as well as income levels and marital status. …

Cnet.com click the link to read the rest of the story.

Is your cloud data secure?

Join the conversation on our Facebook Page!

80% Of Cybersecurity Threats Are Inside Your Business

Forget Russia, China And Iran, Most Threats Are Closer To Home

Three-quarters of incidents are still coming from within the business and its extended enterprise, far greater than the threat from external hackers. Businesses need to shift the focus inwards. …

Forbes.com click the link to read the rest of the story.

Have you been training your employees in cyber-security?

Join the conversation on our Facebook Page!

Major DDoS attacks increased 967% this year

Distributed Denial of Service (DDoS) attacks are increasing in size and frequency, as multi-vector exploits become more of the norm in hacker’s efforts to distract and confuse security teams, while damaging their businesses, according to a Wednesday report from Neustar.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you noticed the increase of attacks on your operation?

Join the conversation on our Facebook Page!

How to fix coffee-shop Wi-Fi

Frequently, the problem with networks is DNS; the wi-fi router is probably using the DNS server of the ISP to which it’s connected. Switch to a public DNS service like Cloudflare’s 1.1.1.1 and you should get connected – and probably find websites a bit more responsive, too. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Have you tried the fix?

Join the conversation on our Facebook Page!

New Ransomware Attacks Much More Expensive to Survive

The average ransom demand is up to almost $13,000, compared with $6,700 just a few months ago.

The average ransom demand by hacker to release files encrypted by their ransomware attack has almost doubled in 2019.  … The sharp increase in ransom payments is linked to the emergence of more expensive and more hands-on forms of ransomware… They’ll exploit vulnerabilities in remote desktop protocols or abuse stolen credentials to gain access to systems, moving around networks and laying the groundwork for their ransomware to encrypt as many PCs as possible for the maximum impact.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company paid a ransom?

Join the conversation on our Facebook Page!

Top 5 risks innovation is forcing businesses to face

Complying with rapidly accelerating privacy regulations is the top emerging risk faced by organizations globally, even above the talent shortage, according to a Thursday report from Gartner. …”With the General Data Protection Regulation (GDPR) now in effect, executives realize that complying with privacy regulations is more complex and costly than first anticipated,” Matt Shinkman, …

“More budget dollars from IT, legal and information security are going to address GDPR compliance, just as the California Consumer Privacy Act (CCPA) is set to take effect, adding another layer of complexity for companies to navigate in this area.”

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Is your company compliant with the new California Consumer Privacy Act?

Join the conversation on our Facebook Page!

Scammers Use Tax Related Emails To Make you Download Malware

The scammers have been delivering the Trickbot Trojan by pretending to send emails from well-known payroll and HR firms such as Paychex and ADP. The emails will contain an attachment that’ll secretly load the malware.

PCmag.com click the link to read the rest of the story. Our FREE Tools can help!

Did you receive these scam emails?

Join the conversation on our Facebook Page!

New Servers are Found and Under Attack – in under a minute

New report demonstrates how quickly hackers see and begin attacks — and the dangers of default login credentials.

It only takes a few seconds for cyber criminals try to hack into newly connected cloud devices and servers!

ZDnet reported that

Researchers at security company Sophos set up honeypots in ten of the most popular AWS data centre locations around the world …  and connected them to the internet with common configuration errors, such as using default credentials or insecure passwords).

It took just 52 seconds for hackers to begin attacking the first server and 20 minutes to start on the California server.

The servers were all on Amazon Web Services.

This is a clear demonstration that no-one is able to fly under the radar whilst online. The attackers are using scripts not to focus on any one individual, but to probe the entire internet address space to look for the low-hanging fruit,” said Boddy.

This scripted approach of attempting to login to your online device means that these attackers can attempt to login to a huge number of online devices in no time at all,” he added.

This illustrates why businesses must have security in place prior to it being given internet access, as well as why your business needs as many layers of security as possible.

References: 
ZDnet

Ingenious.News click the link to read the rest of the story. Our FREE Tools can help!

How safe are your servers?

Join the conversation on our Facebook Page!

Phishing Attacks Are Prevalent During March Madness

With popular sporting events like March Madness, it’s easy for attackers to prey on human emotions with excitement running high and money on the line. With so many employees participating in office pools and brackets, it’s critical to avoid getting phished through fake sporting-themed websites, contests and offers around the games, or malicious browser extensions that claim to keep track of scores and stats.

SecurityBoulevard.com click the link to read the rest of the story. Our FREE Tools can help!

Has your company been hit with this attack?

Join the conversation on our Facebook Page!

You Need Multiple Layers of Security

The findings in the Identity Theft Resource Center (ITRC)’s “2018 End-of-Year Data Breach Report” serve as a stark reminder of why companies should take a layered approach to security.

SecurityIntelligence.com click the link to read the rest of the story.

How many layers of security do you have?

Join the conversation on our Facebook Page!

Cybersecurity is broken: Here’s how we start to fix it

We are building our future on a creaking digital foundation. It’s time for that to change. Cybersecurity is in a terrible state, possibly the worst it’s ever been. Literally not a day goes by without another report of a security breach or a data spill or a hack spilling corporate secrets.

This to me is the way to turn the tide. First, we need to value our own personal data more. …

ZDnet.com click the link to read the rest of the story.

What do you think we should do?
Join the conversation on our Facebook Page!

Even if your data is stored in the cloud, you need to back it up

Relying on your cloud service provider to provide fault-tolerant data storage does not account for the potential of data loss through user error, malicious destruction of data, or other incidents that can result in the loss of mission-critical business data. …

TechRepublic.com click the link to read the rest of the story.

Do you backup your cloud storage?

Join the conversation on our Facebook Page!

Why 91% of IT and security pros fear insider threats

Some 62% of professionals said they believe the largest insider security threat comes from well-meaning but negligent end users…

More than half (53%) of respondents said they felt the employees who were most likely to be a threat were those who have left or were planning to leave the company, or contractors whose contract had ended…

Three-fourths (75%) of respondents said they believe the biggest insider security risks lie in cloud applications, including popular file storage and email solutions like Google Drive and Dropbox.

TechRepublic.com click the link to read the rest of the story.

What systems do you have in place to deal with internal sabotage?

Join the conversation on our Facebook Page!

The Multibillion-Dollar Online Crime Industry

Criminal “products” from the underworld marketplace are part of a sophisticated and highly profitable global industry.. there’s a thriving underground economy online, a place where tools and techniques are advertised and sold — even given away — and where stolen data is laundered to facilitate online crime. What might surprise you is how many of these underground economies there are and how well-established they have become.

This is a sophisticated and highly profitable global industry. In 2016, ransomware alone generated more than $1 billion in profit for criminals. The FBI is now calling “business email compromise,” where scammers intercept suppliers and payment transfers, the $5 billion scam.

Medium.com click the link to read the rest of the story.

Have you been a victim of online criminals?

Join the conversation on our Facebook Page!