Vendor Email Compromise is Officially A Big (Seven-Figure) Problem

While the Solarwinds “sunburst” attack brought to light the compromising of a vendor, Vendor Email Compromise has been around for some time and now seems to be going mainstream. We first mentioned Vendor Email Compromise (VEC) back in late 2019. This method of compromising an email account at one company purposely to use it to

88% Of Data Breaches Are Caused By Human Error

88% Of Data Breaches Are Caused By Human Error

A brand new report confirms what we have been saying for many years now. About 9 out 10 data breaches are caused by your users. Researchers from Stanford University and a top cybersecurity organization found that approximately 88 percent of all data breaches are caused by an employee mistake. Human error is still very much the

Most Phishing Emails Are After Credentials

Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters

Let’s Commit To Protect Our Privacy This Year

commit to protect privacy

  Let’s Commit To Protect Our Privacy This Year How our new identity & privacy app can help By this point in the year you may have already broken some of your New Year’s resolutions, but here’s one to commit to keep: better protecting your online privacy. After all, we are likely to continue to spend more time online in 2021, whether it be

How to Spot, and Prevent, the Tax Scams That Target Seniors

tax scams that target seniors

How to Spot, and Prevent, the Tax Scams That Target Seniors Elderly scams cost seniors in the U.S. some $3 billion annually. And tax season adds a healthy sum to that appalling figure. What makes seniors such a prime target for tax scams? The Federal Bureau of Investigation (FBI) states several factors. For one, seniors

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly

SolarWinds Security Fiasco may have Started with Simple Password Blunders

SolarWinds security fiasco may have started with simple password blunders

SolarWinds security fiasco may have started with simple password blunders UPDATED: Many things came together to crack SolarWinds, but it may all have started with that classic mistake of leaking a lousy password. A SolarWinds third-party, public relations spokesperson, however, claims that the password incident had nothing to do with the major security breach. Many

Ransomware: The Types of and How to Make Ransomware?

how to make sense of security: Ransomware: The Types of and How to Make Ransomware?

How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer or mobile device or by manipulating your files in such a way that you cannot access nor utilize them. Ransomware attacks have been on the rise in the recent past, which can be explained by

How To Fix Your Hacked Joomla Site

Joomla

How To Fix Your Hacked Joomla Website The fact that Joomla has plenty of powerful in-built features make it one of the most used CMS to create websites. Here, one gets access to amazing features like a banner manager, template manager, weblink manager, menu manager, user manager, etc. Unfortunately, its fame is becoming one of

eCommerce Payment Systems – How to Choose the Best One for Your eCommerce Startup

money

There are 3,4 million digital payment system users worldwide. This figure is almost equal to the number of social media users globally and the half of word’s population to date. It is a strong enough reason to believe that online payments dominate the ways we pay for goods and transfer money. What is more, online payments for e-commerce websites are the features your online store can’t do without. So, here are all the answers to your “how” and “why” questions….

How to Keep Consumer Data Safe

how to keep consumer data safe

Every day on popular eCommerce sites, millions upon millions of people are entering valuable information. Their names, credit card information, addresses, and more all being uploaded in rapid quantities. All this sensitive info, especially in regards to payment profiles, has since become the target for malicious cyber attacks and hacking schemes. For businesses implementing their online payment systems, how can they ensure that consumer data is kept safe?….

How Do Random Number Generators Work?

In a real-world casino, random chance plays a huge part in ensuring that games are fair. If neither the player nor the house can predict which card will be drawn next, or where the ball will stop on a roulette wheel, then the games are unpredictable, and therefore fair. Whilst relying on the laws of physics, or the near-infinite number of combinations that a deck of cards can be arranged into is easy in real life, when it comes to online casinos, things aren’t so simple.

The problem is that making something truly random is really quite difficult. Humans are very bad at creating random combinations, and computer programs need to base any number that they generate on an already existing set of data and human input, so how does the casino industry do it?.

How Internet Security Evolved in Tandem with iGaming

How Internet Security Evolved in Tandem with iGaming

For a non-biological entity, the internet is an area filled with constant and unstoppable evolution. From the hardware which backs it to the software systems it carries, nothing in this arena stays the same for long. One of the most major forms these changes take is seen in the world of security.

While there are many fields in which this battle is fought, by focusing on just one it can be possible to track greater trends in the online security environment. For the sake of this article, we want to use online bingo as an example. A simple game to play on the surface, it’s a world in which the real developments run surprisingly deep. Staying steady over the years, the invisible parts of such games are top of the class. But how did we get here?

Zoom Fixes Flaw Opening Meetings to Hackers

Zoom Fixes Flaw Opening Meetings to Hackers

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting. NEW ORLEANS – Enterprise video conferencing firm Zoom has issued a bevy of security fixes after researchers said the company’s platform used weak authentication that made it possible for adversaries to join active meetings. The issue

Facebook’s Twitter and Instagram accounts hijacked

by John E Dunn Last Friday, in full glare of the world, Facebook admins suddenly found themselves in an unseemly struggle to wrestle back control of the company’s Twitter accounts from attackers that had defaced them. Normally, these accounts trumpet new platform features or other assorted worthy accomplishments. But on Friday afternoon, a different type

5 tips for you and your family on Safer Internet Day

by Paul Ducklin No matter how safe and secure you feel when you use your computer, there’s always room for improvement. Why not make Safer Internet Day the excuse you need to do all those cybersecurity tweaks you’ve been putting off… …such as picking proper passwords, turning on two-factor authentication, downloading the latest security updates,

5 tips for businesses on Safer Internet Day

by Paul Ducklin Safer Internet Day is here! Note that it’s more than just One Safe Internet Day, where you spend 24 hours taking security seriously, only to fall back on bad habits the day after. As the old saying goes, “Cybersecurity is a journey, not a destination,” and that’s why we have SAFER internet

Critical Bluetooth bug leaves Android users open to attack

Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction Google has rolled out a security update to address a critical flaw in Android’s Bluetooth implementation that allows remote code execution without user interaction. The vulnerability, tracked as CVE-2020-0022, affects devices running

RobbinHood Kills Security Processes Before Dropping Ransomware

Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files. In a newly detected attack campaign, the attackers behind RobbinHood ransomware deploy legitimate, digitally signed hardware drivers to delete security tools on target machines before they encrypt files. These attacks exploit known vulnerability CVE-2019-19320, report Sophos researchers who

Facebook now lets parents monitor their children’s chats

The feature is part of expanded parental controls on the Messenger Kids app aimed at children under 13 Facebook is rolling out a slew of changes to Messenger Kids that give parents more control over how their children use the messaging app. You can review who your kids are interacting with and review their chat