If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.
10/24/2017 07:32 AM EDT Original release date: October 24, 2017
October is National Cybersecurity Awareness Month, an annual campaign to raise awareness about cybersecurity. The month’s themes educate students and professionals about cybersecurity attack methods, best practices, and preventive measures and ...Continue Reading →
By Richard Branson – Virgin CEO tells how he was almost duped out of $5 Million, and how a close friend of his lost $2 million to scammers.
The SANS institute released the results of a new survey recently, and found that cybersecurity professionals ranked phishing as the number one exploit this year. Phishing awareness training programs were seen by many as the best defense against phishing, spearphishing and whaling exploits. Something that was new this year was the reporting of so-called “malware-less” exploits that use “the built-in features of the operating system to turn it against itself without downloading ...Continue Reading →
Microsoft Windows operating systems
This Alert has been updated to reflect the National Cybersecurity and Communications Integration Center’s (NCCIC) analysis of the “NotPetya” malware variant.
The scope of this Alert’s analysis is limited to the newest Petya malware variant that ...
According to a recent article on Naked Security, not at all hard. While at Black Hat in Las Vegas, researchers from Sophos gave a presentation that dissected the “Philadelphia” ransom software as a service (SaaS) model.
Anyone can buy the Philadelphia ransomware kit on the Dark Web for $400. And for this nominal investment, the would-be attacker gets a simple executable file that sets up the whole system automatically. ...Continue Reading →
On Monday and Wednesday we looked at email account hijacking, how it happens, and what can happen after the account is controlled by an attacker. Today we will see how an attacker could use the beachhead they established in your email account to extend their intrusion.
They have already proven that you are susceptible to phishing and other social engineering exploits. So sending the victim other phishing emails that allow more access ...Continue Reading →
Gifts are always appreciated. Some easy do-ers. Mountain Dew, Doritos, Pie, Pizza.
Here are some cool ideas from my Pinterest feed.
On Monday we opened this discussion about hijacked email accounts, and showed some examples of the phishing tricks that attackers use to get you to reveal your email password. Today we will explore the many useful and profitable exploits that a compromised email account offers a cyber-criminal or other attacker.
I consider email account compromise to be one of the most personally harmful cyber-exploits. When another person has access to your email ...Continue Reading →
Toward the end of last year I made a pair of bold predictions. The first, that ransomware exploits would start declining, because anti-malware software companies were bringing products online that would prevent the encryption from taking place. The second, there would be an increase in Business Email Compromise (BEC) exploits, as cyber-criminals turned to new income streams. I was only half right.
BEC exploits have increased, because the potential returns are so ...Continue Reading →