Hackers

You are here

Hackers Set Their Sights On Smartphones

Cybersecurity researchers are finding that as people are using their phones for more and more things, hackers are increasingly targeting smartphones with malware and other cyberattacks. Because attacks on mobile devices are getting easier and payoffs are bigger, the trend is expected to grow. The best way to stay safe is to make sure your smartphone always has the latest updates from the manufacturer.

Identity Theft for Minors a Growing Problem

Does your toddler already have a credit issue? With so many credit bureaus using nothing but social security numbers as the way to verify a person’s identity, they could. Now many young people are finding out the hard way that they have a credit problem, because often someone in their own family used their identity to open credit card and other accounts. This form of identity theft is often not malicious. Sometimes, it’s being done in a pinch by desperate parents who are trying to make an emergency repair or get the lights turned back on. Estranged family members and hackers have also been known to use this means to gain access to credit in another person’s name.

Social Media Scams Sharply on the Rise

Researchers estimate that social media scams have climbed to 437,165, which is almost double the number from 2016. Attackers in these campaigns employ various techniques, but all are designed to steal financial information, sensitive data, distribute malware and take over accounts. Most use a very personal approach where scammers research the personal information of victims using public information, membership lists or groups, "liked" content on social media, timeline information, and demographics before making their approach.

Would You Pay a Ransom for Your Data?

A recent survey administered by Carbon Black looks at consumers’ responses to ransomware, and you may find the results surprising. The study found that if hacked, 52% of consumers would shell out a ransom for their data, and 12% would pay $500 or more. It was also found that consumers are less trusting of retailers with their data than they are of banks and health care providers. Furthermore, the majority of consumers believe the responsibility is on the individual businesses to keep their data safe, ahead of cybersecurity companies/cybersecurity software vendors, software providers (Microsoft, Apple, Google, etc.), and government organizations (FBI, NSA, CIA, etc.).

After WikiLeaks – Cybersecurity Tips for the Concerned

WikiLeaks recently published a trove of documents that appears to detail how the Central Intelligence Agency successfully hacked a wide variety of tech products, including iPhones, Android devices, WiFi routers and Samsung televisions. That’s just about every major category of consumer electronics. So what does that mean for you if you own one — or several — of these gadgets?

 

For many people, it may mean nothing at all. The thousands of pages of documents refer to programs that attacked outdated versions of the software systems running on devices, and many security vulnerabilities have since been patched. On the other hand, many people may still use outdated software on their devices. And although the C.I.A. designed these tools to spy on terrorists in the interest of national security, the hacking tools may have ended up in the hands of a whole range of entities. So even if you aren’t worried about what WikiLeaks revealed about the C.I.A. right now for yourself, this article from USA Today entitled 9 cybersecurity tips for the mildly paranoid (plus 4 for the truly anxious) with tips for protecting your cellphones and other digital tools is a good thing to look at just to remind yourself to be more careful. Bottom line: Remember to update, update, update!

Dealing with Bogus Pop-Up Alerts

Have you seen a pop-up alert saying your computer has been blocked and you need to call an 800 number to unlock it? What can you do to avoid this kind of scam? First, to get rid of the immediate problem, either close the pop-up window or if that doesn’t work, force-quit the browser: Hit the Command, Option and Esc keys on a Mac or the Ctrl, Shift and Esc keys in Windows, select the browser, and click “Force Quit” on a Mac or “End task” in Windows. Then read “Don't let sketchy pop-up ads scare you” on the USA Today site to understand more about where these scams come from and how to minimize your risk .

Safe Social Media Use a Challenge in Education

Social media is one of the biggest challenges for cybersecurity in the education sector, according to a report from Wombat Security Technologies. The report found that education professionals missed about one-third of assessment questions related to safe social media use. This serves as a good reminder for parents that they should take an active part in helping kids stay safe online and in using social media properly, and not entirely depend on schools to cover these kinds of topics.

No Silver Bullet to End Cybersecurity Threats

As data collection becomes more and more prevalent through devices ranging from your cell phone to your refrigerator, the need for Internet security is higher than ever.

iPhone Users Have the Power to Make Their Phones Less Hackable

The most recent development in the story of searching the San Bernardino terrorist’s cell phone is that the FBI has

Hackers and Hospital Networks

A new trend in cybercrime is exploiting the increased use of connected digital devices in medical settings.

Creating Strong Passwords

By now you should be aware that creating strong passwords is vital for preventing hackers and snoops to getting into your online accounts, but most people still rely on one or two passwords for all

Are the Days of Online Password Entry Numbered?

Cyber security professionals are predicting that the era of user name/ password credentials will soon be a thing of the past with all of the cyber-attacks that have been occurring.

10 Million Passwords Released Online in the Name of Security

Security researcher Mark Burnett posted a database of 10 million usernames and passwords in early Februa

How to Protect Web-Connected Cameras from Hackers

Web-connected security cameras and baby monitors are devices found in many households.

How Safe Is the Cloud?

The recent incident of the posting of hacked celebrity photos after a iCloud software security breach, has many questioning whether the technology can ever be used safely. Proponents of the cloud counter that no technology or application is safe or unsafe in and of itself, and that taking the right precautions can greatly mitigate any vulnerabilities...

Stolen Passwords and Your Password Security

In the wake of the news that a Russian crime ring has stolen 1.2 billion username and password combinations and 500 million email addresses, it is time to think about your password collection once again...