Lets Go Phishing–5 Steps To Empty Your Bank Account

Cybercriminals have lots of ways to exploit their victims, but the single most effect method to gain initial entry remains the phishing email.  If you want to protect yourself from these sorts of exploits you need to know what they look like and what happens if they trick you into responding.  Let’s take a look at a scenario where the bad guys are trying to get your online banking credentials.

  • Step 1:  Cybercriminals will send out a realistic looking but fake ...
Continue Reading →
0

Cybersecurity: What’s Left – Avoidance, Prevention, Detection and Removal

On the Internet, as in real life, there are basically three ways to stay out of trouble, or at least get out of trouble.  They are avoidance, prevention, and then detection and removal.

  • Avoidance – this is actually the easiest and best solution to cybersecurity.  Learn what trouble looks like, and avoid contact.  If you want to avoid malware intrusions, learn how to recognize clever phishing emails and resist the urge to click on a link or open a file attachment ...
Continue Reading →
0

Researchers Discover 17,000 Macs in a Botnet

Image result for apple logoPeople who use Apple computers operate under the assumption that they are invulnerable to malware attacks.  This information is reinforced by the Geniuses at the Apple Store, or so I have been told by more than one of my Mac-based clients.  But we have been warning for several years now that this is no longer true.  This must ...

Continue Reading →
0

95% of Cybersecurity Breached Due to Human Error

“A recently released report from computing giant IBM attributes some 95% of IT security breaches to human error and that over 75% of attacks are targeted at just five industries, proving when it comes to security, people are the real problem”

This just proves once again that when it comes to cybersecurity, training and education for your employees is going to provide a bigger return on investment than anything else you can do.  Most attacks start as email or ...

Continue Reading →
0

7 Steps For Securing Your Email Account

EmailIf you  are using Gmail, Yahoo Mail, or any flavor of Microsoft mail (Outlook.com, MSN, Hotmail, etc.) there are additional steps you should take to ensure that your email is not only secure, but that in the event your email account is hijacked and taken over by bad actors on the web, that you can recover it with a minimum of inconvenience.  Here are the steps:

  1. Create a ...
Continue Reading →
0

Is My Flashlight App Spying On Me?

There has been a bit of a dust up on the Internet over a video from Fox News between journalist Bret Baier and security consultant Gary Miliefsky, SnoopWall CEO.  In the interview Gary claims that the top ten smartphone flashlight apps are collecting information on the user and sending it to foreign countries such as India, Russia, and China.  He states that this information is probably being used to mount cyber-attacks against American assets.  interestingly enough his ...

Continue Reading →
0

Application Whitelisting–Anti-Malware Solution

The problem with preventing or blocking malware exploits is two-fold.  The first issue, frankly, is that the opponents and the tools they are deploying are just so damn good.  This is distressing, and has changed the defensive game from blocking and tackling (prevention) to one of constant vigilance, early detection, and quick recovery.  Basically, we have conceded the network edge, and are fighting the battle from inside the network perimeter.

Continue Reading →
0

Should Your Business Have Cyber-Insurance?

Short answer, probably.  In a guest blog on Virus Bulletin, Sorin Mustaca takes a look at this issue, and unfortunately does not develop a real conclusion to his opening question.  Nevertheless, his article is a great read if you are beginning to think about this issue, because it goes into detail about how cyber risks might be assessed by an insurer, and steps the insured business entity can take to mitigate risk, or that the insurer may require ...

Continue Reading →
0

Sunday Funnies: Competition

Here is another contribution from Aaron Miller and the people at Miller Auto Repair in Somerset Wisconsin.

Fighting competition

The shopkeeper was dismayed when a brand new business much like his own opened up next door and erected a huge sign which read BEST DEALS.  He was horrified when another competitor opened up on his right, and announced its arrival with an even larger sign, reading LOWEST PRICES. The shopkeeper was panicked, until he got an idea. He put the biggest sign ...

Continue Reading →
0
Page 225 of 273 «...200210220223224225226227...»