Linux Kernel Bug

March 1st, 2017

Linux

After a smaller one was discovered in January, security researcher Andrey Konovalov recently uncovered an even larger privilege-escalation Linux Kernel bug that dates back to over a decade ago in the Datagram Congestion Control Protocol (DCCP) by applying Syzkaller which is a Google kernel fuzzing tool. This use-after-free bug (CVE-2017-6074) impacts such major Linux OS […]

That’s Not a Font, That’s a Virus!

March 1st, 2017

Fonts

NeoSmart Technologies, an internet security firm, recently identified a new and very effective cyber scam that has been targeting Google Chrome users by prompting them to update their Chrome Font Pack, but… HoeflerText is not a real font – It’s actually malware in font clothing. Hackers have apparently encoded JavaScript into a poorly secured WordPress […]

Regulation Ripples from Across the Pond

February 27th, 2017

Ripples

The Ripples Are Moving Across the Pond. Will You Be Ready for Regulations? When you think of American money, where do you think of? A mattress stuffed full of dollar bills? Your local bank? Fort Knox? Of course not. When people think of American money they think of New York City. From the billions of […]

Employees: Cybersecurity Assets, Not Liabilities

February 24th, 2017

Employees

Businesses are often needlessly victimized by cybercriminals, due to small yet costly employee mistakes that could have been avoided with just a little bit of education and training. Below is information employees should know in order to make them assets to your cybersecurity team, as opposed to liabilities. Cybercrime Awareness It is crucial that employees […]

Deadly Ransomware

February 24th, 2017

Ransomware Gun

Ransomware has become a household name over the last two years by victimizing not only PC users, but small businesses, as well – most notably financial and medical institutions – by holding data and files hostage in order to blackmail their marks into paying millions of dollars in ransoms. If you are not, however, familiar […]

Define Your Niche and Be Everywhere With Craig Petronella

February 22nd, 2017

petronella

What You’ll Learn In This Episode of The Sales Podcast… How to 20x your fees How to set proper goals and expectations for each step of your sales process Why you need a vertical to dominate to grow your sales How to find the under-served segments to dominate faster and easier and more profitably How to […]

Israeli Soldiers Hacked by Fake Social Media Profiles

February 21st, 2017

Israeli Flag

Are you an Israeli Defense Force (IDF) soldier that has met an extremely attractive Western woman over social media who seems too good to be true?   If so, you’ve probably been hacked. Lookout and Kaspersky have released a report suggesting that a group of sophisticated hackers has been stealing sensitive data from some 100 […]

Microsoft Vulnerability Left to Chance

February 21st, 2017

Microsoft

Google’s Project Zero team has one main goal: to find software vulnerabilities before the black hatters do, and they are very good at their job.  Once a vulnerability is found, the team then gives the company 90 days to patch the vulnerability before releasing it to the public. On June 9, 2016, Project Zero member […]

President Trump Hacked

February 20th, 2017

Trump Hack

The DNC is not the only political party with computer security issues. An official Trump campaign fundraising website, secure2.donaldjtrump.com, was hacked just in time for Presidents’ Day by hackers known only as “Pro_Mast3r” who are apparently based out of Iraq.  The website was “defaced” by the unknown hackers, who displayed a shadowy figure in a […]

Work Email More Dangerous than Personal Email

February 20th, 2017

Email @

An analysis over more than a billion emails yielded some interesting stats when comparing work email versus personal email. The numbers, compiled and reported by Google Research, show that work email is much more prone to hacking attempts, which makes sense.  A compromised work email account can yield a lot more money than a personal […]

Why Hackers Always Have the Upper Hand

February 20th, 2017

Ace Up Sleeve

No matter what you do, when you fight hackers you’re at a disadvantage. Do your backups, setup network infrastructure, even get cybercrime insurance. No matter what you do you will be at a disadvantage once you’re attacked because hackers not only have the element of surprise but they also don’t have to deal with the […]

Latest Yahoo Hack Bypasses Passwords

February 16th, 2017

Yahoo

Poor Yahoo.  They were already involved in a data breach that compromised over a billion user accounts.  Now there’s been another, new hack that they kinda sorta quietly let people know about two months ago. The latest attack was disclosed in a statement Yahoo released in December, but it was mostly overlooked because it was […]

How Your House Could Become a Hacker’s Best Friend

February 16th, 2017

Living Room

How was your Christmas? Get anything good? This may not surprise you, but Amazon had a pretty good Christmas this year. According to an Amazon press release, they sold 9x more echo devices than last year and millions of Alexa devices. That means millions of households just connected to the internet with personal assistant devices, […]

Cybercrime = Death?

February 16th, 2017

Grim Reaper

Cybercrime and death have more in common than you think. No one has died from being hacked yet, but if you keep reading you’ll see why you should fear hackers the same way you fear dying. The Reczone password manager seems like a perfect way to keep your login credentials safe. It is an air-gapped […]

Brute Force Attacks Spreading Ransomware at Alarming Rate

February 15th, 2017

Infected Computer

A hacker group has been using brute force attacks to gain access to small business networks, mostly in Australia and New Zealand, to spread Crysis ransomware since September.  The number of attacks doubled in January and spread to larger businesses in more countries, particularly American healthcare organizations. The hackers gain access to networks through RPD […]

Big Penalties for Little HIPAA Slips

February 14th, 2017

Hipaa 2

Don’t let even a little HIPAA slip go unnoticed.  Presence Health of Chicago was recently fined nearly half a million dollars for failing to alert patients about some missing information. The incident goes back to a paper operating room schedule that went missing in 2013.  The schedule had the names, birthdates and other health information […]

Update Your WordPress ASAP

February 14th, 2017

Wordpress

Though it started out as a simple blogging platform, WordPress has grown to become one of the most popular content management system used in building all kinds of websites, powering over 74.6 million sites.  Recently, however, nearly two million sites have been hacked. The attack, which replaces the content of the website with a message […]

Word Macro Malware Makes its Way to Mac

February 10th, 2017

Mac Word

With Windows-based PCs being much more widely used, hackers have focused their efforts on them much more than they have on Apple Mac computers.  That, however, is starting to change. One example of this is that Word macro malware has recently been discovered on Macs.  If you’re not familiar with what that is, a macro is […]

Nearly Invisible Fileless Malware

February 9th, 2017

Hacker Smokescreen

Fileless malware, which doesn’t need to copy files or folders to a hard drive to be executed, was first detected in 2014, it hasn’t hit the mainstream until now.  And hit it has, having infected more than 140 financial institutions across the world. Fileless malware is injected into and run from the RAM of processes […]

Two More CEO Fraud Victims

February 7th, 2017

Ghosts

Last week we reported about two cases of CEO fraud, where an employee sent sensitive information to a data thief posing as someone high up in a company.  Now we’ve got two more. The victims were Campbell County Health in Wyoming and eHealthInsurance.  In both cases, a thief was able to pass themselves off as […]