Cybersecurity and Personal Data Breach Report Going Phishing

Share This Post:

Cybersecurity and Personal Data Breach Report Going Phishing

1. "Phishing Attempts Soar to 137 Million in Q3"

infosecurity-magazine.com - Author: Phil Muncaster - Date: November 9th, 2018 

Phishing attempts have soared in the Q3 with a 28% increase from the previous quarter.  If you are not familiar with what can be categorized as sextorotion, spam, phishing and crypto scams, then you need to make yourself aware of the growing threat. Phil Muncaster reports, “It is mainly deployed by websites that collaborate with various partner networks. With the aid of pop-up notifications, users are lured onto ‘partner’ sites, where they are prompted to enter, for example, personal data. The owners of the resource receive a reward for every user they process."   ... Continue Reading

READ MORE


2. "What You Should Know About Grayware (and What to Do About It)"

darkreading.com - Author: Curtis Franklin Jr. - Date: November 9th, 2018 

If you are like most of us, grayware is an annoyance that you can't seem to get away from.  What is grayware? "Everyone has seen them: applications that come on many new systems offering services with unfamiliar names, or apps that have familiar names but are offered on sites that aren't from their publishers. They're grayware – or "potentially unwanted applications" – and they're an ongoing issue for computer security." this according to Curtis Franklin Jr.  ... Continue Reading

READ MORE


3. "Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk"

darkreading.com - Author: Michael Fabian - Date: November 9th, 2018 

Our world's infrastructure industries, including utilities, transportation, healthcare, and others, make up 29.2% of reported breaches from cybersecurity attacks.  Michael Fabian acknowledges that this growing threat is concerning and needs more attention. He encourages industries to team up to combat it, "By teaming up to address key technical and organizational issues, information and operational security teams can improve the resiliency and safety of their infrastructure systems."   ... Continue Reading

READ MORE


4. "Worst Malware and Threat Actors of 2018"

darkreading.com - Author: Curtis Franklin Jr. - Date: November 2nd, 2018

This is an interesting article providing information on the leading threat actors for the first half of 2018, with Lazarus out seeding Fancy Bear for the number 1 spot.  This only means something to us if we are part of the cyberattack insurgence, not the cybersecurity solution.  However, the article also highlights what systems and software vulnerabilities the hackers are exploiting most.  This provides some useful insights into protecting your systems. "The malicious actors are increasingly turning from a near-exclusive focus on Microsoft and Adobe software to remote exploits of IoT and Web application platforms, such as Drupal, as they build cryptomining botnets to generate ready income and remain under the radar of law enforcement agencies." ... Continue Reading

READ MORE

 

5. SECURITY TREAT OF THE WEEK: "Tesla Owner Uses 'Summon' to Remotely Move His Car to Avoid Parking Tickets"

jalopnik.com - Author:  Jason Torchinsky - Date: November 2nd, 2018

Tesla has some state of the art features which they are constantly up grading remotely for owners.  Sometimes these are features that are upgraded for free that past owners had to pay for, which is a whole different topic.  One of these features is "Summon".  Here is a creative way one Tesla owner used it to beat the parking ticket police.  ... View the Report

VIEW THE REPORT

Posted by Tim Hill

Comments
Top