Prsoecution

Prosecution for Paying Ransomware? A Possible Method to Ending Attacks

10/01/20
Share: Facebook Twitter Google Email

If at all possible, it’s generally advised that a ransomware demand not be paid. The reasons for this are clear, not only is it a risk that once paid the attackers might still release your data into the ethernet, but once the money is handed over, the ransomware gang now has funds for its...

Iranian Hackers

Iranian Hackers Impersonated US Citizens to Spearphish Aerospace and Satellite Technology Sectors

9/25/20
Share: Facebook Twitter Google Email

Phishing is after all, the most successful type of cyber-attack. Used by run-of-the-mill hackers and state-backed malware gangs alike, it has devastated organizations out of millions. On Thursday U.S. officials sanctioned one of Tehran’s state-backed hacker teams and charged three Iranians...

Phishing

How Fast Does Phishing Awareness Training Wear Off? New Research Says 6 Months

9/24/20
Share: Facebook Twitter Google Email

If you don’t use it, you lose it, right? In the case of cybersecurity awareness training, this is now proven true. A paper titled "An investigation of phishing awareness and education over time: When and how to best remind users" presented at the USENIX SOUPS security conference last month...

Ramsomware

Ransomware Turns Deadly When Hospital is Hit by Cyber Attack

9/21/20
Share: Facebook Twitter Google Email

Ransomware has always been a costly evil--but now it's turned deadly. German authorities last week shared that a ransomware attack on the University Hospital of Düsseldorf (UKD) led to a disruption of IT systems, culminating in the death of a woman who had to be sent to another hospital that...

Vishing

Newest “Vishing” Scam Poses as Spectrum Health Employees

9/16/20
Share: Facebook Twitter Google Email

Has someone you don’t know called you recently to ask for personal information? The answer is most likely a yes, even if you didn’t pick up the phone. Spectrum Health has received numerous reports about phone call scammers, posing as employees to gain access to personal information...

Click

A Simple Wrong Click Led to the Exposure of Covid-19 Patients Data

9/15/20
Share: Facebook Twitter Google Email

We all hit the wrong button sometimes. Unfortunately, in Wales, an employee made a big “oops” and hit the external “publish” button, exposing the personal data of 18,105 Welsh residents who tested positive for COVID-19, and that sensitive information was visible for 20 hours on a...

Deepfakes

Microsoft’s Fight Against Deepfake Images Takes a New Approach

9/10/20
Share: Facebook Twitter Google Email

We’ve all seen just how remarkably real some of these fake videos look. I even have a friend on Instagram who is constantly posting different movie scenes, but it’s my friend’s face on Brad Pitt’s body, an odd visual, but strikingly real. As our world continues to evolve into one that...

Google

Google is Unloading Heavy Ads to Speed Up Web Browsing Experience

9/08/20
Share: Facebook Twitter Google Email

Tired of ads on Google slowing down your system? Google is taking action. Google is introducing a new feature that allows the Google Chrome web browser to automatically unload web ads that use an excessive amount of system resources as part of a push to reduce the browser's network and CPU...

G-Suite Backup

The Backup You Need When G-Suite Goes Down

9/03/20
Share: Facebook Twitter Google Email

What happens when your communication service provider experiences a disruption? A number of Google services including Gmail, Drive, Docs, Meet, Groups, Chat, Keep and Voice experienced service problems worldwide in the last month affecting millions of businesses. According to the Verge, outages...

Tesla

$1 Million Offered to TESLA Employee to Install Ransomware on Company Server

9/02/20
Share: Facebook Twitter Google Email

For those of you unaware of the cyber-attack that goes by the term “social engineering,” it is one of the most dangerous and prominent exploits of human curiosity and trust. Designed to attract the user’s full attention, social engineering contains key pieces of personal information...