Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tech Trends in 2019

Information on trends in technology for drones, security robots, artificial intelligence, security smart homes, and securing IoT.


Feds can’t force you to unlock your phone with finger or face, says judge

The landmark decision asserts the same 4th and 5th amendment legal protection for biometrics that we’re given for passcodes.


Continue Reading →
0

It’s Not Just Phishing – Other Ways Email Is Exploited – Part 2

On Monday we investigated five ways that your email account can be used to initiate an cyber-attack against you.  Today we finish up this article with another five email attack vectors.

  • Clickjacking – In traditional click-jacking, a malicious email link actually direct you to a malicious or impostor site.  A new version places something that looks like a dirt spot or hair on the web page and when the user tries to ...
Continue Reading →
0

It’s Not Just Phishing – Other Ways Email Is Exploited – Part 1

Phishing gets all the press when it comes to email account exploits. This is because phishing is the attack vector for over 90% of all cyber-attacks.  But there are other ways that bad actors, cyber-criminals, and state-sponsored cyber-warriors use email that don’t involve phishing at all, and the outcomes of these exploits can be as bad or even worse than phishing.  Today and Wednesday we will take a look at these ...

Continue Reading →
0

Collections 1-5 – Is This The Biggest Data Breach Ever?

Troy Hunt, of HaveIBeenPwned fame, on January 17 reported what may be the biggest data breach ever.  Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows.  That’s right, 2.6 billion rows.   773 million records, from over 12,000 files, with a total size surpassing 87 gigabytes.  That’s a lot of personally identifiable information ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


WordPress Sites Compromised via Zero-Day Vulnerabilities in Total Donations Plugin

It is our recommendation that site owners using Total Donations delete–not just deactivate–the vulnerable plugin as soon as possible to secure their sites. The following article details the issues present in Total Donations, as well as the active attacks against the plugin. We’ll also take a look at ...

Continue Reading →
0

Watch Out For Social Security Scammers

Your phone may be ringing soon with a fraudulent call from the “Social Security Administration” about problems with your social security number.  The Federal Trade Commission is warning consumers about this fraud.  A transcript of a typical call is below.

“…law enforcement agencies to suspend your Social Security number on an immediate basis, as we have received suspicious trails of information in your name. ...

Continue Reading →
0

The Old is New Again – Return of the Trojan Horse

Trojan horse, backdoor, and spyware exploits are back with a vengeance, according to a recent report by cybersecurity firm Malwarebytes.  These exploits may seem like old and out-of-date attack vectors, but these tools have been updated and revamped, and are appearing at an alarming rate.  Last year, Trojan horse deployments increased by 132%, backdoors increased by 173%, and spyware exploits increased 142%.

Crypto-ransomware and crypto-jacking exploits have been the hot and sexy ...

Continue Reading →
0

Phishing – Not Just For Email Anymore

You know those surveys, games, and “like and copy” messages that your Facebook “friends” share with you?  Would you be surprised to learn that many of these “fun with friends”  activities are just cover for a new form of phishing exploit?  In the last few years phishing attacks have evolved from a primarily email-based attack into attacks using other vectors including surveys, games, gifts and prizes, and social networks.

Continue Reading →

0
Page 2 of 150 12345...»