Cyber Attacker Using Fake “Updates”

updatesCyber criminals are using fake software “updates” to trick company employees into downloading Trojan horse malware to allow the attackers to gain access to the company network.

This is an especially nasty bit of trickery, as we advise our clients repeatedly to keep their software and operating systems updated to maintain the security and integrity of the software.

Once the malware is installed the cyber attackers are able to move around the company ...

Continue Reading →
0

Traffic Lights Are Easy To Hack

green lightAccording to a presentation made by Cesar Cerruda, a security researcher and CTO at IOActive Labs, computerized city infrastructure components such as traffic lights and other utilities are vulnerable to cyber attacks.

Remember the scene in the movie “The Italian Job” where “the Napster” took control of the traffic lights in order to give his cohorts a literal green light to escape?  Or the scene in “Live Free and Die ...

Continue Reading →
0

Cybersecurity Pros Train Free at Cybrary

cybraryInformation technology certification has always been a daunting proposition.  The books and study materials are expensive, and classroom training is expensive, and the exams themselves are not cheap either.  Couple these costs with the time it takes to study, prepared, and test, time that can’t be billed to a client, and therefore hits your bottom line.

Finally, some good news for cybersecurity professionals, and those that would like to be: ...

Continue Reading →
0

Windows 10 Security Upgrades: Hello, Passport, FIDO

Windows10HelloWindows 10 will be featuring a built in security feature called Hello, as well as Passport, for online security, and is supporting the FIDO Alliance as well.  Hello will use fingerprint, facial recognition or iris scanning to authenticate you to your computer, and from there, authenticate you to your domain or workgroup resources.  The facial recognition camera ...

Continue Reading →
0

Nanny Cam Takeover

I’ve been hearing stories about baby cams, nanny cams, laptop cams, computer cams, and inexpensive home security cameras that have been hijacked due to poor or non-existent security setting, and set up for viewing on the camera feed aggregation site www.insecam.org.  These feeds are not just nurseries, but bedrooms, living rooms, and a variety of exterior locations.  These feds also display GPS coordinates, which makes it trivial to find the exact location of the feed source.  See an ...

Continue Reading →
0

Samsung Testing Iris Recognition

As the age of password authentication falls to newer and faster password cracking hardware, software, and list building tools, technologists have been looking at other authentication methods.  Many of these techniques we have covered here: two-factor authentication (2FA), secure key, smartphone authentication apps, Google’s USB security dongle, fingerprint readers, and other biometrics.

Recently, Samsung, together with SRI, have started working on an iris recognition authentication methodology called IOM or “Iris On the Move.”  The human iris, the colored part of the eye, ...

Continue Reading →
0

Dyre Wolf Banking Malware Poses Threat To Your Bank Balance

Modern cyber criminals are using more sophisticated blended attacks to achieve some pretty spectacular monetary hauls.  The Dyre Wolf malware exploits is currently be combined with a spear-phishing approach, a telephone based social engineering middle, and a distributed denial of service (DDOS) attack on the back end to access corporate bank accounts and wire transfer large sums of money.  Originally uncovered by IBM’s security team in 2014, this exploit had netted on cyber-crime group over $1 million dollars.  The IBM ...

Continue Reading →
0

Ransomware Kidnapped Your Files – Should You Pay The Ransom?

CryptoLocker and CryptoWall are largely defunct now, but there are new strains of encryption malware at large on the Internet.  If you fall victim to any of the new ransomware exploits such as Teslacrypt or Ophionlocker, there is bad news, and there is OK news, and there may be good news.

The bad news is that once the encryption malware has finished encrypting all of your personal files in the Documents, Pictures, Music, and Video folders and other stuff in your User ...

Continue Reading →
0

Is Your Computer Part Of A Botnet?

computer-zombieA “bot-net” is a robot network comprised of hundreds, thousands, or even millions of “zombie hosts,” as computers that are infected with bot malware are called.  Botnets are created by a type of professional cyber-criminal known as a “bot-herder,” and generally rented out to other criminals for sending millions of spam messages daily, running huge parallel processing tasks such as password cracking operation, or used by extortionists, hacktivists, and government ...

Continue Reading →
0
Page 108 of 109 «...8090100105106107108109