Local municipalities have also been affected by the bolder acts of hackers nowadays. These hackers have threatened numerous local offices and the municipality takes the toll in it. This is why locals have designed their own security measures to stay away and safe from those cyber criminals – measures that people can also use for themselves.
First, people must take an inventory and network assessments – look in every way that the hackers might access information. Strengthening firewall is very important. It is also necessary to educate everyone in the team not to click on any untrusted link sent in their emails.
Source: Biz Journal
According to HM Revenue and Customs or HMRC, almost 51,000 fraud emails have been reported by taxpayers between the months of April and July. This statistic is twice the number reported on the same period during the previous year. Because of this, the taxman has given a warning about fraudsters’ increased efforts during this tax credit season. The frauds were mostly “phishing” emails, text messages, and websites. These are intended to trick people into providing sensitive information such as account numbers, passwords, banks details, etc. Also, some emails claim to originate from a tax credit agent or include hyperlinks to fictitious government websites. To read the full story, go to Western Daily Press.
Source: Western Daily Press
In the online gaming world, the term “spam” takes an entirely different meaning from the “spam” usually associated with posts and e-mails. Basically, it occurs when a gamer, playing a certain character, uses that character’s attacks over and over again in an attempt to achieve victory over the opponent. In Mortal Kombat X, this is exactly the case. Jacqui Briggs, a new character, has an attack called the “Hand Cannon”. Using this attack which is both powerful and easy to maneuver, players can win easily during matches. This, of course, resulted to a number of boring matches which prompted some players to complain. Check out Game Rant to know more about this story.
Source: Game Rant
“The Year of the Shaken Trust”—it is how Vincent Weafer, McAfee Labs senior vice president, described 2014 due to the hacking of iCloud and Sony nuke leak and that Vietnam is not exempted. Part of the story, on November 24 of the same year, data including those of emails between employees, copies of unreleased films of Sony and salary information of executives of the copy were obtained and leaked by a hacker group operating under the GOP or Guardians of Peace. Until now, the identity of the group behind the leak is yet to be known.
Source: Tuoitre News
This holiday is a season for big deal sales. With all online shops offering big cut prices, how can you tell a genuine one from a scam? Security experts have tips for voucher and sale hunters:
When transacting online, avoid disclosing significant information such as names and addresses, passwords and history. Every consumer must be mindful of the names of sellers published online. Transact with legitimate sellers only and be vigilant on third party resellers. Look for sender’s emails, address, logo and how they compose messages. Look for the URL in the website bar and do not click untrusted links.
Protect your personal data from online hackers and make sure they won’t be handed to wrong people at the wrong time. Patrick Peterson, the founder and CEO of Agari, a security firm based in San Mateo, California said that these scammers use the same steps and methods. Just like the old ways, they use links or download buttons encouraging users to click on.
To safeguard your personal data, make sure that you use a trusted email provider and manage your password well –that includes your PIN and password to bank accounts, emails and other online services that store pertinent information. Lastly, avoid clicking links from unknown and untrusted sources.
The massive email hacking news that roamed around created panic over online community. But worry no more because even your email was included on those hacked accounts, it can’t still be accessed especially when it has been dormant for a very long time and if it has been using a very old password. Habrahabr, a Russian tech blog thought that the leaked Gmail addresses were most likely gathered over phishing scams and weak passwords – not through Google’s server being hacked. If you think that your account has been hacked, immediately change the password and perform two-step verification during the process.
When it comes to how phishing and spy frauds work their way in getting access to your personal information, most of it would simply rely on exploiting ones trust. Most of the time hackers or cybercriminals seem to make a malicious message to appear as if it was from a legitimate source. When that happens, most users on the internet find it easier to work their way into your personal information as well as your bank account. More often than not, a malware would simply get into your system, accessing your personal information and contacts. This allows hackers to send out fraudulent emails on your behalf. The same techniques apply with social networks, instant messaging and SMS text messaging. For more information regarding this post, go to the source.
The plan of a US army commander was to test out how their staffs would easily fall for any phishing frauds, but the plan never turned out as it was supposed to. Allegedly, the receivers believed those emails were real and so they sent the same as a warning to more than thousands of military and government staffs. Check out the full version of the story from the source.
How can you spot a phishing email? Is there a way to do that? As you may already know, phishing emails may steal your credit and personal information. One way to stay out of those phishing emails is to make sure that your spam filter is set up at a very high level. Do not click on the emails you were not expecting to receive. Delete all suspected phishing emails. Read the entire version of the story from the source.