Following The Trends Every year, IBM releases their annual X-Force Threat Intelligence Index which in layman’s terms is essentially an overview of the past years cybersecurity risks and trends. This year’s recent index for instance took a look at 2019’s most popular methods of attack used by hackers. These findings found that the most used…Read More
Clickbait malware sites “You No Longer Need To Be A Member To Shop In Their Stores” (1) “NASA Confirms Earth Will Experience 15 Days of Complete Darkness in November” (2) “First she did this, and then you won’t believe what happened!” If you visit any social media, news sites, or see advertisements online, you will…Read More
Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…Read More
Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…Read More
JP Morgan Chase confirmed that the information from 76 million households and 7 million businesses was compromised after a cyberattack over the summer.
The largest bank in the US first announced the massive attack back in July, but only exposed the scale of the attack Thursday in an 8-K filing with the Securities and Exchange Commission.Read More
Famed ‘hacktivist’ group Syrian Electronic Army claims to have hacked eBay and PayPal Saturday. Visitors of the eBay and PayPal UK websites were redirected to defacement pages, but the group said the point of the DNS hack was not to steal users’ information.Read More
Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.
Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.Read More
Phishing using data URI’s embedded in websites distributed using URL shortening services.Read More