New Phishing Scams Look So Real

There has been a stream of email alerts arriving at my inbox lately that warned of a variety of new phishing approaches that are using well-known brands (OneDrive and Office 365, FedEx and UPS), trusted sources (Department of Homeland Security, Gmail, Yahoo Mail), secure services (TLS certificates and HTTPS web sites) and curiosity (you received an encrypted message) to trick recipients into clicking a link that leads to a fake replica ...

Continue Reading →
0

The New War With Iran

If you think that the US government called off the new war with Iran, you are mistaken.  President Trump cancelled the air strikes due to the potential loss of civilian lives, but cyber war options were in play, and is being aggressively waged by both sides.

President Trump called for a cyber attack against Iranian missile control systems on June 20th.  These attacks were ...

Continue Reading →
0

Guest Post – AI: What should we expect?

Here is another intriguing guest post by Melisa Marzett.

This question was raised long time ago in old science-fiction films. Though those depictions were rather primitive, people started asking questions, for example, what else are they capable of, and how long will it take to develop such intelligence. In these films, the only thing these machines want is to extinguish ...

Continue Reading →
0

Guest Post – Don’t Let Your Phone Stalk You

The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones.  Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.

Stalkerware is not limited to Android phones. It can be installed ...

Continue Reading →
0

Guest Post – Can You Trust Your Trusted Sources?

What follows is a sponsored post from cybersecurity firm Sequretek.

Businesses usually tend to trust their partners/ technology partners when related to the security of the data flowing across partners. This approach has changed drastically these days; now businesses themselves need to focus on their cyber security measures. There is a sudden rise in the number of supply chain attacks, by which we can conclude that attackers are easily spotting out vulnerabilities in the supply chain network of the organisations. Today, ...

Continue Reading →
0

Replacements for Passwords

I have been saying for some time now that passwords by themselves are no longer an effective form of security.  Too easy to hack, too easy to crack.  Currently my go to recommendation is any form of two-factor authentication.  Something like the Google Authenticator App or Yubikey are good choices for your second authentication factor.

On the horizon there are other authentication options that may replace passwords entirely.  Here are a few:

  • DNA ...
Continue Reading →
0

ISSA Survey Results – Cybersecurity Burnout

Recently the ISSA (Information Systems Security Association) released the results of a survey they took in December 2018.  There is a shortage of qualified cybersecurity professionals; not enough people are entering the field, and those with ten or more years of experience may be leaving the field due to stress, lack of a career path, and ineffective mentoring.

The survey ...

Continue Reading →
0

Anubis Banking Trojan Using Google Play and Telegram App

The powerful Anubis banking Trojan is showing up in the Google Play Store in other apps. Currently, Anubis is masquerading as a battery saver and currency converter.  This Android banking Trojan launches a fake app overlay screen when the user opens the app. The user enters his or her account credentials into the fake overlay, which allows the Anubis malware to steal the data. Anubis can imitate 377 financial apps used ...

Continue Reading →
0
Page 2 of 71 12345...»