Security

malicious malware

FBI Hacks Vulnerable US Computers to Fix Malicious Malware

FBI Hacks Vulnerable US Computers to Fix Malicious Malware Malicious malware makes US computers vulnerable to hackers. The FBI has been hacking into the computers of US companies running insecure versions of Microsoft software in order to fix them, the US Department of Justice has announced. The operation, approved by a federal court, involved the …

FBI Hacks Vulnerable US Computers to Fix Malicious Malware Read More »

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

 Free Phishing-Protection Solution Amid The COVID-19 Outbreak As the novel coronavirus (COVID-19) pandemic progresses across the world, cybercriminals are taking advantage of the situation resulting in a spike of phishing scams on remote workforce and corporate systems. While working from home helps the cause of social distancing, it introduces additional risks to the organization. With …

Free Phishing-Protection Solution Amid The COVID-19 Outbreak Read More »

stimulus coronavirus

Beware Of GetYourStimulusCheck.com And Other Coronavirus-Themed Domains

Corona Virus Scams, the Likely Victims, and What They Can Lose With people losing jobs and businesses closing shop due to the coronavirus pandemic, the U.S. government decided earlier this year to release financial aid. This assistance comes in the form of a US$2-trillion monetary stimulus package with the implementation of the Coronavirus Aid, Relief, and …

Beware Of GetYourStimulusCheck.com And Other Coronavirus-Themed Domains Read More »

Facebook

Facebook Will Not Notify More Than 530m Users Exposed in 2019 Breach

530 Million Facebook Users Not Notified of Exposed Data Breach Company spokesperson said Facebook was not confident it had full visibility on which users would need to be alerted Facebook has not notified the more-than 530m users whose details were exposed on a hacker forum in 2019 and has no plans to do so, according …

Facebook Will Not Notify More Than 530m Users Exposed in 2019 Breach Read More »

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof

Data Scraped From 500 Million LinkedIn Users Found For Sale Online

500 Million LinkedIn Users Data Sold Online IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users. A massive trove of LinkedIn account data has been found for sale online, containing 500 million user records …

Data Scraped From 500 Million LinkedIn Users Found For Sale Online Read More »

REvil Ransomware call victim

REvil Ransomware Now Helps with Extortion by Offering to Call the Victim’s Contractors and the Media

The bad guys are going to great lengths to ensure they make their money. As part of its Ransomware-as-a-Service, REvil is now expanding its services to aid in the extortion phase. REvil/Sodinkibi has been a major player in the RWaaS market, providing its’ affiliate bad guys with functional ransomware malware and a payment site. They …

REvil Ransomware Now Helps with Extortion by Offering to Call the Victim’s Contractors and the Media Read More »

remote workforce security report

New Release: 2021 Remote Workforce Security Report

Holger Schultze wrote: The need to secure the remote workforce has never been more critical. A year into the pandemic, organizations are still grappling with how to protect their assets. The Remote Workforce Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, …

New Release: 2021 Remote Workforce Security Report Read More »

New UK National Cyber Security Centre Head Warns that Cybersecurity Should be Taken More Seriously

New UK National Cyber Security Centre Head Warns that Cybersecurity Should be Taken More Seriously

Even though the UK has made ‘huge progress’ on cybersecurity efforts, the new Chief Executive of the National Cyber Security Centre (NCSC) Lindy Cameron believes that the current efforts are still not enough. The new security head previously worked as a Director-General for the North Ireland office. She also worked for the Department for International …

New UK National Cyber Security Centre Head Warns that Cybersecurity Should be Taken More Seriously Read More »

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem. From Services to Distribution, to Monetization, cybercriminals are getting so organized, cybersecurity experts are now beginning to see how vast the relationships to cybercrime and connections really are.

It’s worrisome when your organization comes under cyberattack in the first place.

iStock 1205460056252028129

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem

While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to …

Vendor Email Compromise is Officially A Big (Seven-Figure) Problem Read More »

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its …

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials Read More »

How Internet Security Evolved in Tandem with iGaming

How Internet Security Evolved in Tandem with iGaming

For a non-biological entity, the internet is an area filled with constant and unstoppable evolution. From the hardware which backs it to the software systems it carries, nothing in this arena stays the same for long. One of the most major forms these changes take is seen in the world of security.

While there are many fields in which this battle is fought, by focusing on just one it can be possible to track greater trends in the online security environment. For the sake of this article, we want to use online bingo as an example. A simple game to play on the surface, it’s a world in which the real developments run surprisingly deep. Staying steady over the years, the invisible parts of such games are top of the class. But how did we get here?

ring doorbell app for android caught sharing user data with facebook data miners

Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners

Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners Amazon’s Ring Doorbell app for Android is a nexus for data-harvesting, according to an investigation by the Electronic Frontier Foundation (EFF). Privacy advocates allege Ring goes so far as to silently deliver updates on Ring customer usage to Facebook, even if the Ring …

Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners Read More »

text message package scam delivers more than your business bargained for

Text message package scam delivers more than your business bargained for

There’s a text message scam making the rounds that could target your mail room staff, receptionist, or other employees. The FTC has tips on how you can protect your business. Our Consumer Blog describes a text message people are receiving that claims to be a FedEx tracking notice. In variations on the scheme, fraudsters also …

Text message package scam delivers more than your business bargained for Read More »

facebooks twitter and instagram accounts hijacked

Facebook’s Twitter and Instagram accounts hijacked

by John E Dunn Last Friday, in full glare of the world, Facebook admins suddenly found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts from attackers that had defaced them. Normally, these accounts trumpet new platform features or other assorted worthy accomplishments. But on Friday afternoon, a different type …

Facebook’s Twitter and Instagram accounts hijacked Read More »

critical bluetooth bug leaves android users open to attack

Critical Bluetooth bug leaves Android users open to attack

Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction Google has rolled out a security update to address a critical flaw in Android’s Bluetooth implementation that allows remote code execution without user interaction. The vulnerability, tracked as CVE-2020-0022, affects devices running …

Critical Bluetooth bug leaves Android users open to attack Read More »

RobbinHood Kills Security Processes Before Dropping Ransomware

Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files. In a newly detected attack campaign, the attackers behind RobbinHood ransomware deploy legitimate, digitally signed hardware drivers to delete security tools on target machines before they encrypt files. These attacks exploit known vulnerability CVE-2019-19320, report Sophos researchers who …

RobbinHood Kills Security Processes Before Dropping Ransomware Read More »

how your screens brightness could be leaking data from your air gapped computer

How your screen’s brightness could be leaking data from your air-gapped computer

It may not be the most efficient way to steal data from an organisation, let alone the most practical, but researchers at Ben-Gurion University in Israel have once again detailed an imaginative way to exfiltrate information from an air-gapped computer. And this time they haven’t done it by listening to a PC’s fan, or watching …

How your screen’s brightness could be leaking data from your air-gapped computer Read More »

how to catch a cybercriminal tales from the digital forensics lab

How to catch a cybercriminal: Tales from the digital forensics lab

What is it like to defeat cybercrime? A peek into how computer forensics professionals help bring cybercriminals to justice. Many people ask me about what it was like working for law enforcement. More often than not, however, they are actually enquiring about how computer crime is truly investigated. Whether it’s questions about how accurately it …

How to catch a cybercriminal: Tales from the digital forensics lab Read More »

Scroll to Top