Elizabeth Hernandez
Rise in Domain Spoofing Whaling Attacks
If you are employed in the accounting department of your company, you need to be more careful as hackers are specifically targeting account department executives. Whaling attacks are on the rise and hackers are using domain spoofing techniques to trick … Read more
Kaspersky Lab Uncovers Microsoft Silverlight Security Vulnerability
A Microsoft Silverlight security vulnerability is something of a rarity. The application framework may be similar to Adobe Flash, but it does not contain nearly as many security vulnerabilities. In fact, it is exceptionally rare for a bug to be … Read more
Microsoft Fixes Critical Windows Security Flaws
The first security update of the year for Microsoft may have only included 9 security bulletins, but six of them have been marked as critical. The critical Windows security flaws include 7 bugs that permit the remote execution of code, … Read more
Rovnix Malware Being Used to Attack Japanese Banks
Security researchers at IBM’s X-Force have identified a worrying new Rovnix malware strain that is being used in a spate of cyberattacks on Japanese banks. Rovnix malware is nothing new. It has been around for a couple of years but … Read more
Internet Explorer Security Risk Warning as Microsoft Pulls Plug on IE 8,9, 10
Microsoft has announced it will be pulling the plug on old versions of Internet Explorer and will be withdrawing software security support on IE 8, 9, and 10 from Tuesday January 12, 2016. An Internet Explorer security risk warning has … Read more
Hackable Bug Found In World’s Most Secure Smartphone
What is arguably the world’s most secure Smartphone may not be quite as secure as users have been led to believe. A hackable bug has been discovered that allows Silent Circle’s Blackphone 1 to be hijacked. On its release, Silent … Read more
TeslaCrypt Ransomware Attacks on the Rise
Gamers have been put on high alert following news that TeslaCrypt ransomware attacks are on the increase. The file-encrypting malware was first identified in March of this year, but this month the number of attempted attacks has skyrocketed. TeslaCrypt ransomware … Read more
iOS Malware Boom Expected in 2016
The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from malware. While previously thought of … Read more
Juniper Networks Backdoor: Further Information Emerges
Further information has emerged on the Juniper Networks backdoor discovered last week, which suggests the NSA had a hand in the installation of a backdoor in the company’s source code. Last week, a Juniper Networks backdoor was discovered after the … Read more
Apple Malware Infections Double in a Year
Hackers are concentrating on developing mobile malware that targets Android devices, but Apple malware infections are increasing. Furthermore, security researchers are predicting Apple malware infections will grow steadily over the course of the next 12 months. Apple malware infections are … Read more
3 PC Rise in Corporate Malware Attacks in 2015, Say Kaspersky
According to research conducted by Internet security firm Kaspersky Lab, corporate malware attacks have increased by 3% year-on-year. In 2015, 58% of companies had been attacked with malware on at least one occasion and the motivation for conducting corporate malware … Read more
Cryptowall Malware Just Got a Whole Lot More Dangerous
Cryptowall malware has been a major threat since it was first released on the unsuspecting world in September 2014. It did not take long for the malware to evolve, with a second version seen within a matter of weeks. A … Read more
Insider Phishing Scams Targeting UK Tech Companies
Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent bank transfers. The insider phishing scams are highly … Read more
Google Account Phishing Email Prompts AG Warning
Massachusetts attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts to fool users into revealing their passwords by warning … Read more
New Facebook Video Phishing Scam Uncovered
It is almost every day that a Facebook video phishing scam is discovered, and yesterday was no exception. Scammers are increasingly looking to take advantage of Facebook’s drive to compete with YouTube as the go to place for watching video … Read more
Intuit Security Warning Scam: Quicksbooks Users Targeted
Users of the Intuit Quickbooks accounting software package are being targeted by scammers. Emails have been sent to users of the software warning them that they need to update their web browsers for ‘the best online experience’. They are issued … Read more
Bitcoin Black Friday: Bargain Hunters Beware!
The biggest online shopping day of the year may be Cyber Monday, but for the Bitcoin community it is Bitcoin Black Friday. Bitcoin has grown in popularity with the online community as a secure alternative method of paying for goods … Read more
Phishing Warning Issued as IRS e-Services Scam Discovered
The discovery of a new IRS e-Services scam has prompted the Internal Revenue Service to kick off its Security Awareness Tax Tips with a phishing warning. New IRS e-Services Scam Reported IRS tax scams are nothing new. In fact the … Read more
Customers Advised to Watch for Electric Ireland Phishing Scam
Phishing emails, which seem to be genuine have been recently targeting Electric Ireland customers. They give a genuine reason for clicking on the link included in the email and have been well written. The link brings the recipient to a … Read more
New Critical Android Vulnerability Discovered
A new critical Android vulnerability has been discovered that could potentially allow Android Smartphones to be hijacked by hackers without any user interaction required. The vulnerability affects Chrome JavaScript v8 – and not just older devices but the latest models … Read more
Ransomware Protection: SMBs Must Get Prepared
SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB, ransomware protection is essential. Ransomware protection is no longer … Read more
Bermuda Electricity Company Customers Targeted with Ransomware
Citizen of Bermuda and holiday home owners have been warned to be diligent following the identification of a new BELCO email scam. Guidance has now been issued by the company after some customers were targeted by scammers and were issues … Read more
Email Scam Uncovered Involving DRIDEX Malware
A new DRIDEX email scam campaign has been identified that has resulted in an angry response from Swedish furniture retailer Ikea. The hackers to blame for the malware have targeted Ikea customers by sending fake emails asking them to open … Read more
Credit Card Numbers Captured in iTunes Email Scam
A recent report published by Malwarebytes has revealed that a new email scam campaign has been identified which tries to con users to trick users into sharing the credit card numbers that they use for iTunes. This email scam involves contacting … Read more
A Honeypot for Malware Can be of Great Benefit to Your Organization
Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware regardless, so why not make sure it gets installed … Read more
Porn Malvertising Targets Top Porn Site Visitors
Porn websites are often considered to be rife with malware, although the major websites spend big to keep their sites malware free. That said, a recent porn malvertising campaign hit one of the largest adult websites placing millions of site … Read more
Apple Malware Attack Affects 225,000 Device Owners
Apple device security is particularly robust, yet the company’s operating systems are far from impregnable as a recent Apple malware attack has shown. Apple device users have recently been targeted by hackers believed to be operating out of China. The … Read more
Cisco Router Malware Discovered
According to reports from FireEye, IT security professionals do not only need to be concerned about malware attacks on computers, servers, and Android devices: Cisco router malware has now been discovered. Cisco router malware discovered on 79 devices to date … Read more
Lessons Learned from the Ashley Madison Data Breach
Did you think the Ashley Madison data breach was mildly humorous? Did you think that it serves the people right for cheating on their husband, wife or life partner? If you did, you certainly didn’t have an account with the … Read more
The Ever Changing Role of a Systems Administrator
The role of a systems administrator is certainly challenging, mainly because it is constantly changing. This is the way it always has been since the role of a systems administrator was first defined. Now if you were to write down … Read more
Benefits of Teaching Hacking Techniques
This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it is, but teaching hacking techniques … Read more
SMBs Can Minimize Cybersecurity Risk with Good Risk Management Strategies
All companies must make efforts to minimize cybersecurity risk, but for small to medium sized businesses it is critical. The very survival of the business may well depend on it. Small to medium-sized businesses must minimize cybersecurity risk The same … Read more
Adobe Flash Exploit Delivering Cryptowall Ransomware
Last week, a zero-day vulnerability in Adobe Flash Player was patched. Users of the multimedia player can now run the software safely, without facing a risk of having their devices compromised by a new Adobe Flash exploit. Provided the patch … Read more
Best Firewall Security Zone Segmentation Setup
Regardless of the size of your company, or what type of TCP/IP setup you have, a hardware firewall is essential. It is one of the most fundamental network security elements. It provides basic protection and is capable of preventing many … Read more
Five Common Business Network Security Myths
Unfortunately, common business network security myths have led many small to medium sized business owners to believe they are well protected against hackers, malicious insiders, and online criminals. They perceive their network to be secure, but that confidence may be … Read more
Is It a Good BYOD Strategy to Not Allow Personal Devices to Connect to the Network?
The Internet of Things of IoT offers a lot of potential, but unfortunately these Internet-connected devices also introduce a considerable amount of risk. The term Internet of Things covers any device that connects to the internet, which includes a wide … Read more
Bank Phishing Scams Claim Many Victims
The financial sector is reeling from one of the most sophisticated cyberattacks ever seen. The APT-style Carbanak malware attack differs from other APT attacks, as the attackers are not after data. They want cold hard cash and they are getting … Read more
You Need to Learn How to Think Like a Hacker to Secure Your Network
If you watch Scorpion on CBS, you will be familiar with Walter. Walter knowns how to think like a hacker. He is one. In fact, Walter was an malicious as a child. He hacked the government and got up to … Read more
Beebone Botnet Shut Down by Europol
The infamous and particularly dangerous Beebone botnet has finally been taken out of action following a joint initiative between Europol and the FBI. The Beebone botnet was believed to be controlling well over 100,000 computers late last year, and while … Read more
Best Patch Management Practices
All operating systems have security issues Best patch management practices enable you keep on top of the security issues that are constantly being discovered. It seems as soon as one patch is released to deal with xyz security issue, another … Read more
Holiday Season Sees Employees Ignore Basic Web Security Practices
Holiday shopping season is almost upon us. Not only does Thanksgiving weekend signal the start of the Christmas shopping rush, the two busiest online shopping days of the year fall either side of Thanksgiving weekend – Black Friday and Cyber … Read more
Cyberattacks on Universities Grow: Time to Boost Defenses
All computer users are at risk of downloading malware or computer viruses. The malicious software is sent out in bulk mail, and everyone will receive an infected email attachment or a link to a malicious website at some point. Often … Read more
Tighten Password Security or You Will Be Hacked!
According to recent research, the number of stolen password and username combos for sale on the Internet is around 360 million. That number is likely to grow substantially, as hackers are targeting companies and are stealing login credentials. If you … Read more
Contractor Security Risk Management Advice
If you want to keep your network as secure as possible, don’t let anyone connect to it. That is not particularly practical advice of course. Employees must be allowed access, and when devices are allowed to connect to a network, … Read more
How the Target Hack Would have been Worthless with Encrypted Credit Cards
Encrypted credit cards? Don´t they already exist? Encrypted credit cards have been around for a long time now – or, at least, credit cards with a limited amount of encryption. The magnetic strip on the back of each credit card … Read more
Employee Libel on Social Media: Employers May Be Found Liable
Sexual harassment in the workplace and unfair dismissal were two of the main reasons for legal action being taken against employers; however, now employee libel on social media websites can be added to that list. It is now far easier … Read more
Dorkbot Malware Spotted on Facebook Chat
Facebook invests heavily in security protections for its users and advertisers; however hackers have been using a new variant of Dorkbot malware and have been using Facebook chat to infect users’ devices. Dorkbot malware is a W32 worm that spies … Read more
Skype Account Vulnerabilities Reported
Skype offers businesses a way to cut telecommunication costs, while simultaneously improving communication between employees and making it easier for customers to get in touch. However, many companies have failed to deal with Skype account vulnerabilities and are leaving their … Read more
What is the Risk of Digital Life Hacking? Are You in Danger?
Many people are concerned about identity theft and believe that the risk of digital life hacking is considerable. Others think that having their digital life hacked, stolen, and taken over by someone else is something that only happens in the … Read more
Facebook Graph Search Privacy Issues Cause Concern
Facebook Graph Search privacy issues have been caused concern, especially for business owners. They are worried that their confidential information will be used by the social network and shown in the search results. As a result, many companies and individuals … Read more