Category: Hacking

I pulled out the attempted hacks to this site over the last few hours. It is sad to see the direction this is taking.

2016-01-17_13-01-25

I just received the message below via email. This is nobody I’ve been into contact with before and I did not download the linked file. Services like Wetransfer is getting popular and now unfortunately the hackers has caught on and is using this as a vehicle to get their trojans and viruses installed so be warned.

The message is a valid Wetransfer email, so the hackers has simply used their service and entered in me as a recipient of their no doubt virus file.

2016-01-14_22-55-42

Protecting your business against online hacker is your main goal. To achieve this goal, you need to choose between hiring a third-party security provider and to do it on your own. If you prefer a DIY, you need to consider the following points.

You need to consider your experience and expertise. Do not risk it unless you know how to handle it personally or you have an IT staff who can do it. Third-party providers have the experience, skills, and tools to execute. Lastly, online security requires intense planning and maintenance and it won’t work if you are not committed to it.

Source: Forbes

mail2Cyber security is such a common phrase nowadays. The fact that major cases of corporate data attacks is frequently happening all over the world, it is important that you let yourself be familiar with online risks. However, the nation’s freight sector is still exposed to cyber criminals due to the wealth and the victims from whom they can steal money. Warehouses, 3Pl’s and carriers all hurry up and tries hard to keep up with today’s technology curve, most of them overlooked simple security measures.

The reason behind is most of them are utilizing several systems with susceptible gaps, leading to miss areas of opportunities to increase their online protection. During an interview by Fleet Owner, the Vice President of Information Security for the Descartes Systems Group, Mr. Matt Foroughi said that it is essential that they stay up to date with essential security measures. For more information regarding this post, go to the source.

Source: GobyTruck

Computer-MouseLastpass is considered by many as a godsend for its services that allow users to store their various passwords online and retrieve them using master passwords. On Monday, however, the company announced in an official statement that hackers have broken into their system. As a result of the incident, a great number of user data was stolen including email-addresses, password reminders, and even master passwords. The breached was discovered on Friday and Joe Siegrist, LastPass’ co-founder and CEO, has written in a blog post that the firm is confident that their encryption measures are capable enough to protect their users.

Source: Time

 

online threatsAs trends change, so do hackers. Due to this fact, it’s no longer surprising to know that online threats also develop. One such threat is Adobe Flash. This program is on almost all computers and web browsers and it has recently become a favorite playground for hackers and cyber criminals. Certain security loopholes on Adobe Flash may allow hackers to download viruses or even gain remote access to your computer. The second biggest threat is Ransomware. It’s a virus, usually sent through mail that encrypts your data files and prevents you from gaining access unless you pay a ransom. Visit Kim Komando for more information about these threats.

Source: Kim Komando

 

online securityIn the article “Experts bust Android security myths”, a group of experts has offered eight useful tips to IT users and administrators regarding online security. To strengthen security, one useful tip is to never root an android device. Rooting a device is equivalent to an alteration at the administrative level and this will make the device more vulnerable to malware. Another tip is to not focus solely on malware or overlook other security threats. Other threats as dangerous as malware that you also need to be cautious of include data harvesting, data exfiltration, poor encryption, mismanagement of passwords, and many others. Read the rest of the tips on CIO.

Source: CIO

computer2Australian businesses are always under threat from cyber criminals who are using inherent features of their systems and infrastructure that are connected to digital networks.  Rate of cyber attacks is increasing, according to Australian Signals Directorate. It also said that the most common targets are the banking and finance, defense capability and telecommunications and resources and energy. But others never have to be complacent because criminals are also looking for an opportunity other than those listed above for carrying out fraud and theft.

Source: CSO

Screen-exclamationPeople all know that vulnerability has been out there for many years and that they have discovered threats out there. For one, online shoppers are at the mercy of websites where they are buying their goods, but these are also places, where security can be at risk. What can you do to avoid the issue? First, look at the padlock symbol in the site’s URL, which can indicate if the website is using an HTTP that can encrypt communications. You should also be selective when it comes to giving your payment information on websites to use for later purchases. Do not store your credit card information on them to avoid thefts from getting your personal and financial details. See the full story from the source.

Source: Market Watch

security1Security researcher Mark Burnett is under FBI questioning after publishing 10 million usernames and passwords on his blogat Safer Internet Day. He has also written an article to justify his action and explaining himself to the authorities. On his blog, he justified that his action does not mean to deceive or hack pertinent information but to call the authorities to make a better authentication process to avoid such unauthorized access.

Massive hacking has been in media highlight after several organizations suffered from unauthorizedwebsiteaccess such as Sony Pictures. With all Burnett’s explanations, he is still subject for further questioning.

Source: Irish Examiner