June 1, 2020
If you are a vice president or managing director and are working in either banking or IT, be very wary of any emails with any attachments, especially those that lead to a site with a reCAPTHA. If you finally make it to a login page, look closely at the URL, especially, the extension. This is a well-designed attack that is destined to produce a lot of victims. Try not to be one of them.
COVID-19 + Excel Attachment = Lost Data
June 1, 2020
Be aware of any email that evades your spam filter and seems to come from Johns Hopkins or W.H.O. (World Health Organization) with a tie to COVID-19 in the subject line. . . it's a phishing attack using an Excel attachment.
Russian Gang Making Millions Hacking Cities and Counties across America
May 6 2019
Once upon a time, North Korea only cared about cyber espionage. Most of the time, they wanted to spy on South Korea or disrupt South Korean operations. Then, a terrible thing happened.
April 8, 2019
Bad apps keep getting through; according to Google, less than 1%. Nonetheless, 1% of 1 billion is still 10 million… just saying. Notice that apps containing Trojans lead the way, and that’s not good. These apps release malware that can quickly gain control of your device. These are often RATs (Remote Access Trojans) which enable hackers to control your device remotely.
Hackers Find a New Way to Get Control of Your Bank Account
March 11, 2019
Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. .
When Algorithms Go Bad
March 11, 2019
Algorithms could be manipulated to have weapons misfire or fire on the wrong target . . . A database, itself, could be infected to make algorithms reach dangerous conclusions
It’s Hacking Season in Tibet
February 25, 2019
The scenario outlined above highlights the sensitivity of algorithms to manipulation by nefarious agents. Algorithms could be manipulated to have weapons misfire or fire on the wrong target,
5 Surprising and mostly Unknown Cyber Security Facts
February 18, 2019
At the time of this writing, SpeakUp is being used to install cryptomining software, however, few researchers believe this is its ultimate goal, as it has the sophisticated architecture to launch a far more devastating worldwide attack.
February 11, 2019
Clicking on one of the options shown above will take you to these fake survey sites or to sites offering free gift cards to well known stores. All you have to do is give them some personal information.
“Love You” Phishing Emails Arrive in Time for Valentine’s Day
February 4, 2019
The point is to get you interested in the subject line, abandon normal caution, and open the inviting attachment. Sadly, you will find no love there.
The Business Process Compromise: The Cyber Attack You Don’t See Coming
January 28, 2019
Most companies and organizations simply can’t compete with the hackers behind these attacks. If a breach actually occurs, the F.B.I. suggests you work with them.
Cyber Insurance Firms Fund Malware Development
January 21, 2019
Billions are being made by these extortionists because ransomware is the easiest way for hackers to get a quick payoff. If cyber insurance companies guarantee ransom payments, they, in effect, guarantee an income for novice hackers around the globe.