Tag Archive: Hackers

lockyRansomware, what is it? Defined as “malware for data kidnapping,” it is one of the top security issues in the digital and cloud age, wherein the hacker or attacker encrypts data and asks for ransom (usually a Bitcoin payment) for the decryption key.

Today, another ransomware threatens the online community “Locky” that can hit you if you were ‘unlucky.’ It works similarly like the modus conducted by the banking software Dridex.

How Locky works?

A victim will be sent an email with a Microsoft Word attachment disguising as an INVOICE that requires macro.

[By default, Microsoft disables it due to security reasons. So a user normally will see a warning if an attachment contains it.]

Now if you would enable the macro function, it will run and then download Locky to your PC, according to the Palo Alto Networks.

[It is the same modus operandi used by Dridex, a notorious Trojan that steals banking account details.]

There are suspicions that the distributors of Locky are connected to one of the main men of Dridex because both use the same mode of malware distribution.

If you or your organization happens to be the unlucky target, your files will be unrecoverable unless you have a regular backup or if your data has not been touched yet.

Lately, the Hollywood Presbyterian Medical’s computer system was infected by ransomware in which the hackers ask for 9,000 bitcoins (or approximately US$3.6 million).

Reports indicated that the operators behind Locky may have conducted a large attack. Palo Alto Networks revealed that it had detected 400,000 sessions that used the same downloader “Bartallex,” which is the one that deposits the infection onto a computer system. Over half of the targets were recorded in the United States and the rest included Australia and Canada.

Locky utilizes its command-and-control infrastructure for conducting a memory exchange before encrypting the files.

Kevin Beaumont from Medium said that encrypted files have the ‘.locky’ extension. He wrote guidance on how to figure out who among the people in an organization has been infected and recommended that the active directory account of the victim must be locked and its network access must be shut down. Finally, he said that you are more likely to rebuild the victim’s PC from scratch.

Check out the full story here.

Computer-WarningMost experts are warning the public of Wi-Fi hotspots that are managed by experienced hackers. This report is yet the ever-continuing series of the “Hacking of America” that greatly indicates the vulnerability of public networks like those in New York City’s Time Square. Expert security authorities warn the public of the need to be extra cautious when connecting to Wi-Fi hotspots at any popular tourist destinations across the country.

These networks would surely be able to expose your identity online. One warning precaution that one should be reminded of is the word “free”. NBC’s Tom Costello did share his insights on how an individual can protect their security online. For more information regarding this post, go to the source.

Source: Today

With news about cyber crime and security breaches becoming rampant, it is very important to keep up with the measures needed to keep your information safe.  Among these methods include using two-factor authentication to prevent other people to change your passwords and accessing your account. It is also important to encrypt all devices and pertinent information.

Getting jailbroken devices out of the market will keep hackers from getting into company’s data security. You also need to keep your anti-virus and firewall updated to block ads that may lead to untrusted sites. Lastly, it is very important to keep your software updated to maximize software and device security.

Source: Tech Co

globe2Security experts warn users about the increasing cases of online security breaches.

Jonathan Sander, security expert from Lieberman Software thinks that people know about the essence and importance of good security – they don’t just do anything about it. An expert from Tripwire revealed that the risks in online security increase yearly – leaving significant effects and losses.

Hackers have been attacking the same security details they have had many years ago – weak passwords. Leaks in Cloud is associated with weak passwords that users use in their interconnected accounts – viewing it to be more convenient. But experts say this is actually dangerous.

Source: Western Daily

 

Screen-exclamationThere is really nothing new to threats that each and everybody else must be aware of whenever they go online. Even before the leak with iCloud, hackers are still able get into a vulnerable website with added human errors. Lieberman Software’s Jonathan Sander explained that a person’s insight about their health should also be the same for their security online by using unique credentials that include a password. Moreover, Ken Westin who is a Senior Security Analyst for Tripwire said that security breaches this year is higher than last year. Most experts say that this has something to do with the continued patronage for cloud-based apps or programs used as storage. For more information regarding this post, check out the resource listed below.

Resource: Western Daily Press

Computer-MouseLastpass is considered by many as a godsend for its services that allow users to store their various passwords online and retrieve them using master passwords. On Monday, however, the company announced in an official statement that hackers have broken into their system. As a result of the incident, a great number of user data was stolen including email-addresses, password reminders, and even master passwords. The breached was discovered on Friday and Joe Siegrist, LastPass’ co-founder and CEO, has written in a blog post that the firm is confident that their encryption measures are capable enough to protect their users.

Source: Time

 

online threatsAs trends change, so do hackers. Due to this fact, it’s no longer surprising to know that online threats also develop. One such threat is Adobe Flash. This program is on almost all computers and web browsers and it has recently become a favorite playground for hackers and cyber criminals. Certain security loopholes on Adobe Flash may allow hackers to download viruses or even gain remote access to your computer. The second biggest threat is Ransomware. It’s a virus, usually sent through mail that encrypts your data files and prevents you from gaining access unless you pay a ransom. Visit Kim Komando for more information about these threats.

Source: Kim Komando

 

Screen-exclamationWhen you are bound for a vacation or perhaps a business trip, always bear in mind that you are still at risk from cyber criminals. Remember, scammers and hackers do not take vacations. One crucial tip is to leave behind highly confidential documents that you don’t necessarily need to bring along with you. As for safeguarding your personal devices and gadgets in public, never leave them unattended. Doing so will provide an easy opportunity for thieves to steal your information. And when you’re already traveling, it will be very tempting to connect to WIFI networks. Accessible as they may be, they don’t come without accompanying risks.

 

Source: TimesUnion

Computer-ErrorHow do you keep yourself safe online? One is to use strong passwords, something to prevent you from experiencing any hacking incident. Each account should have a different password, but avoid settling for weak, easy-to-guess ones.  Activate two-factor authentication if it is offered. In this case, a cyber criminal will not be able to get into your account unless they can get their hand on your Smartphone.  Two, choose a cloud service to protect your data better. Read the full list of tips from the source.

Source: Blogher

globe2Due to recent security breaches, including those of the White House, Sony and Target, everyone is looking for ways on how to improve security. If large businesses could be targets, then what more less secure smaller businesses could be? If you own a small business, then you must also develop your security plan and find the right tools to suit your needs and your budget. One to use is FCC Small Biz Cyber Planning, an online resource helping small businesses in creating customized cyber security plans and allowing them to choosing menu of expert advice in addressing their specific business and concerns. For a complete list of tools to use, check out this news story.

Source: Practical Ecommerce