Hackers

You are here

Social Media Scams Sharply on the Rise

Researchers estimate that social media scams have climbed to 437,165, which is almost double the number from 2016. Attackers in these campaigns employ various techniques, but all are designed to steal financial information, sensitive data, distribute malware and take over accounts. Most use a very personal approach where scammers research the personal information of victims using public information, membership lists or groups, "liked" content on social media, timeline information, and demographics before making their approach.

Would You Pay a Ransom for Your Data?

A recent survey administered by Carbon Black looks at consumers’ responses to ransomware, and you may find the results surprising. The study found that if hacked, 52% of consumers would shell out a ransom for their data, and 12% would pay $500 or more. It was also found that consumers are less trusting of retailers with their data than they are of banks and health care providers. Furthermore, the majority of consumers believe the responsibility is on the individual businesses to keep their data safe, ahead of cybersecurity companies/cybersecurity software vendors, software providers (Microsoft, Apple, Google, etc.), and government organizations (FBI, NSA, CIA, etc.).

After WikiLeaks – Cybersecurity Tips for the Concerned

WikiLeaks recently published a trove of documents that appears to detail how the Central Intelligence Agency successfully hacked a wide variety of tech products, including iPhones, Android devices, WiFi routers and Samsung televisions. That’s just about every major category of consumer electronics. So what does that mean for you if you own one — or several — of these gadgets?

 

For many people, it may mean nothing at all. The thousands of pages of documents refer to programs that attacked outdated versions of the software systems running on devices, and many security vulnerabilities have since been patched. On the other hand, many people may still use outdated software on their devices. And although the C.I.A. designed these tools to spy on terrorists in the interest of national security, the hacking tools may have ended up in the hands of a whole range of entities. So even if you aren’t worried about what WikiLeaks revealed about the C.I.A. right now for yourself, this article from USA Today entitled 9 cybersecurity tips for the mildly paranoid (plus 4 for the truly anxious) with tips for protecting your cellphones and other digital tools is a good thing to look at just to remind yourself to be more careful. Bottom line: Remember to update, update, update!

Dealing with Bogus Pop-Up Alerts

Have you seen a pop-up alert saying your computer has been blocked and you need to call an 800 number to unlock it? What can you do to avoid this kind of scam? First, to get rid of the immediate problem, either close the pop-up window or if that doesn’t work, force-quit the browser: Hit the Command, Option and Esc keys on a Mac or the Ctrl, Shift and Esc keys in Windows, select the browser, and click “Force Quit” on a Mac or “End task” in Windows. Then read “Don't let sketchy pop-up ads scare you” on the USA Today site to understand more about where these scams come from and how to minimize your risk .

Safe Social Media Use a Challenge in Education

Social media is one of the biggest challenges for cybersecurity in the education sector, according to a report from Wombat Security Technologies. The report found that education professionals missed about one-third of assessment questions related to safe social media use. This serves as a good reminder for parents that they should take an active part in helping kids stay safe online and in using social media properly, and not entirely depend on schools to cover these kinds of topics.

No Silver Bullet to End Cybersecurity Threats

As data collection becomes more and more prevalent through devices ranging from your cell phone to your refrigerator, the need for Internet security is higher than ever.

iPhone Users Have the Power to Make Their Phones Less Hackable

The most recent development in the story of searching the San Bernardino terrorist’s cell phone is that the FBI has

Hackers and Hospital Networks

A new trend in cybercrime is exploiting the increased use of connected digital devices in medical settings.

Creating Strong Passwords

By now you should be aware that creating strong passwords is vital for preventing hackers and snoops to getting into your online accounts, but most people still rely on one or two passwords for all

Are the Days of Online Password Entry Numbered?

Cyber security professionals are predicting that the era of user name/ password credentials will soon be a thing of the past with all of the cyber-attacks that have been occurring.

10 Million Passwords Released Online in the Name of Security

Security researcher Mark Burnett posted a database of 10 million usernames and passwords in early Februa

How to Protect Web-Connected Cameras from Hackers

Web-connected security cameras and baby monitors are devices found in many households.

How Safe Is the Cloud?

The recent incident of the posting of hacked celebrity photos after a iCloud software security breach, has many questioning whether the technology can ever be used safely. Proponents of the cloud counter that no technology or application is safe or unsafe in and of itself, and that taking the right precautions can greatly mitigate any vulnerabilities...

Stolen Passwords and Your Password Security

In the wake of the news that a Russian crime ring has stolen 1.2 billion username and password combinations and 500 million email addresses, it is time to think about your password collection once again...