Remember when the internet was fun? These days it seems to be more minefield than playground. Users are treading cautiously and trusting nothing, wondering is this link safe and is that site infected? It’s difficult to enjoy your digital world when wor…
SamSam ransomware is back with a surprising addition
The ransomware strain that locked up the city of Atlanta in March of this year has returned, cybersecurity experts report, but with one mysterious addition. This new variant of the most infamous ran…
Amazon Web Services (AWS) hijacked for 2-hour heist
For two hours on Tuesday, the website MyEtherWallet.com, a cryptocurrency wallet where thousands of users store their Ethereum, was leeched of roughly $150,000. Cybercriminals hacked into the site by…
At this very moment, your inbox is teeming with them. Like an annual migration upriver, phishing emails swim their way into the inboxes of all Americans when tax season rolls around. Every January 1st through April 15th, cybercriminals blitz the public with their most clever deceits. They pose as someone you know or an institution you use, stating in an official-sounding way that “there’s a problem with your account, just click here to clean it up.” That’s their bait. It’s all decoy.
You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.
Endpoints are an easy target for hackers, so it’s essential that small businesses protect themselves. Connected employees, vulnerable software and weak antivirus all contribute to this being a favorite target of hackers. And, as the list below details, there are many types of cyberattacks that target endpoints, from phishing to malvertising.
Cybercriminals are aggressively uploading cryptocurrency mining malware to GitHub. The cybercriminals fork other projects, which on Github means producing a copy of someone else’s project, to build upon the project or to use as a starting point and subsequently push a new commit with the malware to the project. The projects which have been forked appear to be chosen at random. A list of affected GitHub repositories can be found at the bottom of this blog post.
Locky is a considerable security threat that is now widely spread.
It’s that time of the year again – tax season is upon us. Recently, the Internal Revenue Service wrapped up its annual “Dirty Dozen” list of tax scams. This year, identity theft topped the list, but phone scams and phishing schemes also deserve special mentions. It’s important that taxpayers guard against ploys to steal their […]
The holiday season is coming up and we expect that many will opt to shop online to avoid the big crowds in city centers, malls and stores. In America, Cyber Monday, the cyber version of shopping day Black Friday, was born in the mid 2000s. Cyber Monday sales have steadily increased since its inception and […]