A quick Saturday digest of cybersecurity news articles from other sources.
Online Holiday Shopping Scams
Original release date: November 24, 2020
With more commerce occurring online this year, and with the holiday season upon us, the Cybersecurity and Infrastructure Security Agency (CISA) reminds shoppers to remain vigilant. Be especially cautious of fraudulent sites spoofing reputable businesses, unsolicited emails purporting to be from charities, and unencrypted financial transactions.
CISA encourages online holiday shoppers to review the following resources.
- CISA’s Online Shopping Tip
- CISA’s Holiday Online Shopping page
- CISA’s Social Engineering and Phishing Attacks Tip
- The Federal Bureau of Investigation’s (FBI’s) ‘Tis the Season for Holiday Online Shopping Scams – Don’t Be a Victim Announcement
Gift card hack exposed – you pay, they play
These crooks hacked into a network hoping to get everyone in the company to buy them gift cards. Very simply put, the crooks were after as many accounts as they could access to buy as many gift cards as they could as quickly as possible.
The Ultimate Privacy Guide for Mac Users
Last Updated by Julia Olech on October 02, 2020
It’s the human operator that is the weakest link.
It’s easy to overlook Mac’s vulnerabilities due to the common myth that macOS is protected from all online threats. However, the truth is that all internet connections make any operating system susceptible to security threats — including your Mac.
Just in 2019, the McAfee Labs Threat Report revealed that approximately 30,000 new forms of Mac malware were discovered in the first quarter of the year. Unfortunately, according to AVG, the number of hacker attacks on Mac is only expected to grow. For this reason, it’s crucial to protect your Mac and avoid exposing your personal information to hackers.
Though there are many ways that your Mac’s security can be compromised, you can prevent all security breaches with a few simple steps. In this guide, I’ll give you tips on how to optimize your Mac’s security settings and protect your personal data from any possible hacker attack. More…
Remote working: This new Microsoft VPN aims to make your mobile devices more secure
Microsoft has delivered a managed VPN for mobile devices — using a Linux container.
PHP 8: What WordPress Users Need to Know
This entry was posted in WordPress Security on November 23, 2020
PHP 8.0 is set to be released on November 26, 2020. As the programming language powering WordPress sites, PHP’s latest version offers new features that developers will find useful and improvements that promise to greatly enhance security and performance in the long run. It also fully removes a number of previously deprecated functions. PHP 8 is a massive change from previous versions.
Linux Users Should Be On High Alert For Drovorub Malware Attacks
Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub […] The post Linux Users Should Be On High Alert For Drovorub Malware Attacks appeared first on CHIPS.
About the Author:I am a cybersecurity and IT instructor, cybersecurity analyst, pen-tester, trainer, and speaker. I am an owner of the WyzCo Group Inc. In addition to consulting on security products and services, I also conduct security audits, compliance audits, vulnerability assessments and penetration tests. I also teach Cybersecurity Awareness Training classes. I work as an information technology and cybersecurity instructor for several training and certification organizations. I have worked in corporate, military, government, and workforce development training environments I am a frequent speaker at professional conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference in 2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2006 at http://wyzguyscybersecurity.com