North Korean Botnet Attacked by FBI

The North Korean Cyberwar Operations group is known variously as Lazarus Group, Guardians of Peace, or Hidden Cobra. A few of their notable achievements include the 2014 attack on Sony Pictures inspired by the satirical Seth Rogan film “The Interview, ” the $81 million cyber bank heist  against Bangladesh’s central bank, and the 2017 WannaCry ransomware attack.

In June 2017, US-CERT sent a   Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


OUCH! Ransomware Attack Via MSP Locks Customers Out of Systems

If your computer technical support is provided by an outside vendor, you need to know this.  We have warned about this problem before.

Earlier this week, an unidentified threat actor managed to launch a ransomware attack resulting in the encryption of between 1,500 to 2,000 ...

Continue Reading →
0

Cyber Attacks Against Businesses – Frequency and Methodology

Cyber attacks against businesses, regardless of size, are increasing in the number of attacks, the types of attacks, and the costs of the attacks.  Company losses include theft of cash assets, employee identity information, stolen files and proprietary information, network downtime, loss of sales, and reputation costs.  For a small privately held business, a serious breach can put them out of business.

For ...

Continue Reading →
0

Unhappy Valentines Day – Romance Fraud

This Valentine’s Day, be careful of who you let into your heart.  Unfortunately for every love-lorn single there is a fake Romeo or dating site scammer waiting to separate them from their money.  According to the FBI, the amount of money losses to victims of romance fraud makes it the second most lucrative cyber crime, generating $211 million for the perpetrators. Only business ...

Continue Reading →
0

Too Legit – The DocuSign No Malware Phishing Exploit

You or your CFO receive an email offering business capital at attractive interest rates.  The company that sent you the offer has provided an application for the loan using the legitimate document presentation platform, DocuSign.  Everything looks legit, and it is.  No fake web pages or near-miss web addresses.  But this is the latest in “no malware” phishing scams.

Filling out the form will ...

Continue Reading →
0

Common Phishing Subject Lines

Phishing is still the number one tactic used by malicious actors to collect passwords and other information.  Phishing works because the attacker is able to create an email that is believable and looks realistic.  The best ones appear to come from a customer, supplier, coworker or other trusted source, and the content makes sense for your business or personal life.  The most successful way to prevent phishing from ruining your ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Tech Trends in 2019

Information on trends in technology for drones, security robots, artificial intelligence, security smart homes, and securing IoT.


Feds can’t force you to unlock your phone with finger or face, says judge

The landmark decision asserts the same 4th and 5th amendment legal protection for biometrics that we’re given for passcodes.


Continue Reading →
0

Page 124 of 273 «...100110120122123124125126...»