stimulus coronavirus

Beware Of GetYourStimulusCheck.com And Other Coronavirus-Themed Domains

The likely victims, and what they can lose. With people losing jobs and businesses closing shop due to the coronavirus pandemic, the U.S. government has decided earlier this year to release financial aid. This assistance comes in the form of a US$2-trillion monetary stimulus package with the implementation of the Coronavirus Aid, Relief, and Economic Security (CARES) Act. To date, some 88 million eligible Americans have received stimulus checks amounting to US$1,200 per individual. And as the government hints on giving out another round of stimulus checks, there are debates on how these could reach citizens faster. Some suggested using digital dollars for additional financial aid. The approach, it’s said, would be faster or maybe even instantaneous compared to...

hackers love tax season

Who loves tax season besides accountants? Hackers

Who loves tax season besides accountants? Hackers  It’s tax time in the United States, and even if you’re pretty sure you did everything right, you’re worried. Did I file correctly? Did I claim the right deductions? Will I get audited? Unfortunately, tax season brings out scammers eager to take advantage of your anxiety. The tax scam landscape First, know that you’re probably doing a good job with your taxes. Less than 2% of returns get audited and most discrepancies or adjustments can get handled easily if you address them promptly. Still, wariness of the IRS and intricate tax laws makes for ripe pickings when it comes to hackers, who prey on people’s fear of audits and penalties. Common scams...

Don’t Let Tax Fraud Ruin Your IRS Refund

Don’t Let Tax Fraud Ruin Your IRS Refund

Don’t Let Tax Fraud Ruin Your IRS Refund Here’s how to lock down your data this tax season Tax season is always a high time for scams that put our money and information at risk. But this year securing your data may be more important than ever, due to a spike in unemployment fraud. Millions of Americans have lost their jobs over the course of the pandemic, and states have seen a surge in unemployment applications, including fake claims using stolen information. In California, authorities report that between $10 billion and $30 billion was recently paid in fraudulent unemployment claims, while in New York authorities identified $5.5 billion in fake jobless claims since March of 2020. Victims don’t even...

Why Thieves are Targeting your Trash

Why Thieves are Targeting your Trash

A group of criminals in St. Tammany Parish, LA were arrested after they went dumpster diving. This criminal ring was targeting trash from a local loan business – one of those “cash now” places. The group rummaged through the trash to gather personal information about customers. They used this information to either steal existing credit cards or open new ones. Then they went on spending sprees. At some retailers, they convinced the cashiers to type in the credit card number so they didn’t need to swipe the card. This way they could use stolen card numbers even if they didn’t have a physical card. According to local police, the crime wave went on for about a year, affecting at...

Facebook

Facebook will not notify more than 530m users exposed in 2019 breach

Company spokesperson said Facebook was not confident it had full visibility on which users would need to be alerted Facebook has not notified the more-than 530m users whose details were exposed on a hacker forum in 2019 and has no plans to do so, according to company representatives. Business Insider reported last week that phone numbers and other details from Facebook user profiles were available in a public database. The social media company acknowledged in a blogpost on Tuesday that “malicious actors” had obtained the data prior to September 2019 by “scraping” profiles using a vulnerability in the platform’s tool for syncing contacts. Facebook has said it plugged the hole after identifying the problem at the time. But a...

protect connect remote work

How to Stay Connected and Protected in a Remote Work Environment

How to Stay Connected and Protected in a Remote Work Environment   Advancements in cloud solutions and collaboration tools in recent years, coupled with the necessity of going remote due to the pandemic, have empowered today’s workforce to choose where they want to work. While the ability to work from anywhere—home, the library, coffee shops or even the beach– gives employees increased flexibility, the shift from the traditional office setting has exposed security and logistical concerns. Remote workers often access sensitive information from unsecured devices and networks, which can result in compromised data and failed privacy compliance. Canada’s federal government introduced a bill in November 2020 that proposed stringent privacy protection laws after realizing the security threats of a distributed...

how to protect against ransomware

5 Great Tips To Learn How To Protect From Ransomware

5 Great Tips To Learn How To Protect From Ransomware Every business owner and worker needs to learn how to protect from ransomware attacks. Ransomware is malicious software used by hackers to access and encrypt computers and computer networks. As the owner of the device or computer network, the encryption locks you out until you pay the demanded ransom. Only after you have paid are you allowed access to your device or network. Ransomware gets into your device or network in many different ways. However, social engineering is the most common. This means that the hackers study their targets and send them ransomware as genuine links or information. In businesses, which are the most common targets of ransomware attacks, hackers...

Telehealth

Check up on Your Virtual Safety: Tips for Telehealth Protection

Check up on Your Virtual Safety: Tips for Telehealth Protection In a poll conducted by the Canadian Medical Association, nearly half of Canadians have used telehealth services since the start of the pandemic. Additionally, in a recent McAfee study, we found that 21% of Canadians have used the internet for a doctor visit in 2020, and 28% said that such online visits will become a part of their routine moving forward Telehealth, or virtual care. This includes clinical services delivered remotely via electronic communications, such as videoconferencing, mobile apps and remote patient monitoring technology. Many of us have readily accepted these medical services out of necessity, as COVID have limited in-person hospital visits. Hackers are taking advantage of the...

how social media negatively affects work job

How Social Media Can Hurt Your Job Search And Your Future Career

It may seem that social media is your private network of friends and followers where you’d be able to post and share info like jobs what’s really on your mind in a given moment. However, this assumption is misleading since these “private” activities of yours are there for everyone to see, including your potential employers. Studies show that 90% of employers consider the candidate’s social media activity when hiring and 79% of HRs have rejected a candidate because of what they found on their social media. Therefore, it only makes sense to pay attention to our present and past social media activity and not let our social networks harm our professional prospects. If you are searching for a new...

LinkedIn data breach of 500m accounts

Data scraped from 500 million LinkedIn users found for sale online

IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users. A massive trove of LinkedIn account data has been found for sale online, containing 500 million user records including email addresses, phone numbers, links to other social media profiles and professional details. An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample. Reported by CyberNews researchers, the leak was posted to a forum popular with hackers by a user asking for a “four-digit $$$$ minimum price” for access...

REvil Ransomware call victim

REvil Ransomware Now Helps with Extortion by Offering to Call the Victim’s Contractors and the Media

The bad guys are going to great lengths to ensure they make their money. As part of its Ransomware-as-a-Service, REvil is now expanding its services to aid in the extortion phase. REvil/Sodinkibi has been a major player in the RWaaS market, providing its’ affiliate bad guys with functional ransomware malware and a payment site. They are relying on the affiliate to attack, infiltrate, and compromise the victim networks in order to deploy the ransomware. This split of duties brings REvil somewhere between 20-30% of the ransom, with the affiliate taking the remainder home. So, it’s mutually beneficial to both parties that the ransom first, be paid and second, be as much as possible. The exfiltrating of data and extorting...

New Release: 2021 Remote Workforce Security Report

Holger Schultze wrote: The need to secure the remote workforce has never been more critical. A year into the pandemic, organizations are still grappling with how to protect their assets. The Remote Workforce Security Report reveals the status of organizations’ efforts to secure the new workforce, key challenges, and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more. Key findings include: Almost three-quarters of organizations are concerned about the security risks introduced by users working from home; despite these challenges, 86% are likely to continue supporting remote work in the future. Key security challenges cited include user awareness and training (57%),home/public WiFi network security (52%), and sensitive data leaving the perimeter (46%). The applications...

New UK National Cyber Security Centre Head Warns that Cybersecurity Should be Taken More Seriously

New UK National Cyber Security Centre Head Warns that Cybersecurity Should be Taken More Seriously

Even though the UK has made ‘huge progress’ on cybersecurity efforts, the new Chief Executive of the National Cyber Security Centre (NCSC) Lindy Cameron believes that the current efforts are still not enough. The new security head previously worked as a Director-General for the North Ireland office. She also worked for the Department for International Development (DfID), and was responsible for international programs in Africa and APAC. In her upcoming speech to Queen’s University Belfast, she will highlight the recent SolarWinds hack on US government agencies, and the Microsoft Exchange zero-day vulnerability as current real-world examples. In a highlight from her speech, she talks about the growing threat of ransomware and how it is affecting public schools/universities. She will...

prevent malware

A Discussion on How to Prevent Ransomware Attacks

Is your PC shielded against ransomware assaults? Ransomware is a kind of malware (vindictive programming) which crooks use to extract money. It holds info to payoff with encoding or by keeping clients locked from their gadgets. This article shows you everything to know on how to prevent ransomware attacks. We investigate the various approaches to shield your PC and your information from ransomware assaults. Pernicious programming that utilizes encoding to hold information for delivery has gotten fiercely effective in the most recent couple of years. The reason for this product is to blackmail cash from the casualties with guarantees of re-establishing encoded information. Like other PC infections, it finds its way onto a gadget by exploiting a security opening...

phishbait-surveys-rule-changes-boss

A Can of Phish Bait: from Surveys to Rule Changes to Your Boss’s Boss

Employees need to continue being wary of phishing scams as they begin to return to the office, according to Roger Kay at INKY. Kay describes several phishing templates that INKY has intercepted in recent months, including one that informed recipients that they needed to fill out a compliance form related to COVID-19 risks. “Reasonably well written, this email, apparently from the human resources department at the target company, actually came from phishers located in the United Kingdom,” Kay writes. “There are elements that might strike the recipient as strange. For example, the phrase ‘recuperating favorably’ is a bit off. Noncompliance is spelled ‘non-compliance.’ And ‘these guide and policies’ has an agreement-of-number problem. But otherwise, it’s a pretty good fake,...

Spoofing Tailored to Financial Departments

Spoofing Tailored to Financial Departments

Researchers at Area 1 Security have warned of a large spear phishing campaign targeting financial departments and C-suite employees with spoofed Microsoft 365 login pages. The researchers say that in some cases the attackers “specifically targeted newly-selected CEOs during critical transitionary periods.” Additionally, the attackers went after executives’ assistants. “Beyond financial departments, the attackers also targeted C-suite and executive assistants,” Area 1 says. “Targeting high-level assistants is an often overlooked method of initial entry, despite these employees having access to highly sensitive information and an overall greater level of privileges. In a few instances, the attackers even attempted to bait newly-selected CEOs of two major companies before any public announcements of this significant senior executive changeover were made.” The...

Billions of Spoofed Emails

Why Should You Be Using DMARC? 3 Billion Spoofed Emails are Being Sent Everyday

In a recent report from TechRadar, email is still the most popular form of malware distribution. Billions of emails that are spoofed are being sent everyday. Even though email is still the oldest form of online communication, it is still the go-to platform for cybercriminals to attempt to infiltrate. According to the report by Vailmail, “80% of all email inbox providers do DMARC check on inbound emails”. And with the pandemic, COVID-19 has been the key target for recent malicious email activity. Especially since your organization is still working remote. Since the increase enforcing of Domain-based Message Authentication, Reporting and Conformance (DMARC), a report from Vailmail found that there is still an influx of spoofed email messages. Despite this...

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof

Days after a massive Facebook data leak made the headlines, it seems like we’re in for another one, this time involving LinkedIn. An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author. Updated on 07/04: We updated our personal data leak checker database with more than 780,000 email addresses associated with this leak. Use it to find out if your LinkedIn profile has been scraped by the threat actors. The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information,...

Android mobile phone monitoring tracking spy

Researchers Have Their Eye on Malicious Clones of Android Apps That Put Devices at Risk

Researchers at Check Point have found malicious apps in the Google Play Store that will download Trojans to infected devices. “Check Point Research (CPR) recently discovered a new Dropper spreading via the official Google Play store, which downloads and installs the AlienBot Banker and MRAT,” the researchers write. “This Dropper, dubbed Clast82, utilizes a series of techniques to avoid detection by Google Play Protect detection, completes the evaluation period successfully and changes the payload dropped from a non-malicious payload to the AlienBot Banker and MRAT.” The malicious apps posed as VPNs or audio apps. Once the malware was installed, it would gain access to the device’s banking apps. “The AlienBot malware family is a Malware-as-a-Service (MaaS) for Android devices...

Ransomware Attacks Are Growing More Costly and Effective by the Day

Ransomware Attacks Are Growing More Costly and Effective by the Day

The availability of commodity bots and ransomware is making the business of ransomware accessible to just about every. And, according to new data, everyone’s getting in on the game. We love reports that provide an insightful view into what the bad guys are doing, quantifying what we’re all experiencing as an industry. A new report from threat intelligence firm Group-IB entitled Ransomware Uncovered 2020-2021 sheds some much needed light on the current state of not just attacks, but the specific methods and techniques used in today’s ransomware attacks. According to the report: The average ransom in 2020 was $170,000; up from $80,000 in 2019 The average dwell time on a victim network was 13 days The average downtime resulting...

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem

Cybercrime Officially Has Its Own Global Ecosystem. From Services to Distribution, to Monetization, cybercriminals are getting so organized, cybersecurity experts are now beginning to see how vast the relationships to cybercrime and connections really are. It’s worrisome when your organization comes under cyberattack in the first place. ...

Vehicles Most Likely To Survive An EMP Attack

The 3 Vehicles Most Likely To Survive An EMP Attack

When it comes to disasters we all hope that our vehicle will get us out of dodge if needed… But, what would you do if there was an EMP attack? An electromagnetic pulse attack (EMP) is a burst of electromagnetic energy, it can be a natural occurrence or man-made. The problem is, there is no guarantee what will or won’t be damaged from an EMP. Our electric grid would likely be heavily damaged, if not destroyed – along with anything else electrical… Which includes our cars. Newer cars have so many electronic components that there is little hope they would safe. But, there are a few vehicles that have the best chance of surviving an EMP. Here are a...

survive brutal cold

Military Tips To Survive The Brutal Cold

“A man in the cold is not necessarily a cold man.”– Mike Tipton. Knowing how to survive is key. Tyson S. was a 30-year-old man from Utah who moved to a remote part of Alaska. He had been living alone after purchasing his cabin. His nearest neighbor was over 20 miles away. Beautiful mountains, rivers, and lakes separated Tyson from civilization. Yet, one mistake almost cost him his life. Tyson told police that his cabin had a very old stove. One evening, he put a big piece of cardboard in the stove to start a fire. But, the stove sent a spark up the chimney, which landed on the roof. A few hours later, Tyson noticed something dripping from...

Chinese Have Likely Hacked Your Microsoft Exchange Email Server

Chinese Have Likely Hacked Your Microsoft Exchange Email Server

Chinese Have Likely Hacked Your Microsoft Exchange Email Server. What if Chinese state-sponsored hackers have owned your OWA using several brand-new zero-day vulnerabilities? On March 2, Microsoft released emergency security updates to plug four security holes in Exchange Server versions 2013 through 2019 that hackers were actively using to siphon email communications from Internet-facing systems running Exchange....

Android phone ransomware

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users

Attention Android Users: This Free VPN App Leaked the Data of 21 Million Users To live our digital lives to the fullest, we rely on a variety of technologies to support our online activities. And while some apps and devices are meant to make certain tasks more convenient or provide us with greater security, others simply offer a false sense of security and could potentially lead to online misfortune. One such platform is SuperVPN. While users may applaud themselves for using a VPN to protect their privacy, this Android app is unfortunately spilling their secrets without their knowledge. ...

How Does Ransomware Spread Globally? Through Malware.

How Does Ransomware Spread Globally? Through Malware.

Ransomware is a type of malware that involves encrypting a company’s or individual’s useful data or blocking users from accessing their computer systems in exchange for a given amount of money. Cybercriminals are always on the look-out for creatives means for getting a hold of your data so that they can have them at ransom. Every day you hear of someone’s account being hacked. But, how does ransomware spread? You ask yourself. It is a common question that most people ask and wonder, especially when the attack strikes. This article delves into seven common ways through which Ransomware has and still manages to spread globally. They include the following. Email Attachments Email is a common avenue for ransomware transmission....

Scroll to top