Browsed by
Author: Greg Swiecicki

Building Pro-Active Security Hygiene Helps in Preventing Ransomware Attacks: Microsoft

Building Pro-Active Security Hygiene Helps in Preventing Ransomware Attacks: Microsoft

During the pandemic threat, several new cybersecurity scams emerged. The Microsoft Threat Protection Intelligence Team has noticed that cybercriminals are trying to get as much information as possible from various organizations in this challenging time to be able to attack and want to make profits in the future.

https://www.cisomag.com/building-pro-active-security-hygiene-helps-in-preventing-ransomware-attacks-microsoft/

Crooks threaten to leak customer data stolen from e‑commerce sites

Crooks threaten to leak customer data stolen from e‑commerce sites

In recent weeks, criminals have taken a liking to all sorts of scams, which are scams involving someone’s trust and subsequent use, especially to extort money. The customer incident is more complex, many e-commerce sites have been database scammed, and scammers threaten to disclose them.

https://www.welivesecurity.com/2020/05/26/hackers-steal-customer-data-demand-ransom-retailers/

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps

The vulnerability found by Norwegian companies has enabled hackers to attack mobile devices using virtually any Android application. Cybercriminals aim at users’ banking applications and spy on their activities. Unfortunately, the new critical vulnerability revealed a few days ago is even more sophisticated.

https://thehackernews.com/2020/05/stranhogg-android-vulnerability.html

5 common password mistakes you should avoid

5 common password mistakes you should avoid

It would be best to remember your passwords, but in the case of complex passwords, it is almost impossible. It’s essential to use a password manager that acts as a safe. Passwords are collected in an encrypted form. It is is a specific obstacle to other ones. The main password to safe the other ones should be complicated and remembered by you. Do not write down your password anywhere. Forgetting a password can be fatal; first of all, you lose access to the safe with passwords and block all access.

https://www.welivesecurity.com/2020/05/07/5-common-password-mistakes-you-should-avoid/

Insidious Android malware gives up all malicious features but one to gain stealth

Insidious Android malware gives up all malicious features but one to gain stealth

ESET researchers have tested a unique and dangerous Android application through which you can perform many wicked actions. The “DEFENSOR ID” banking Trojan can delete a bank account, take over e-mail or social media.

https://www.welivesecurity.com/2020/05/22/insidious-android-malware-gives-up-all-malicious-features-but-one-gain-stealth/

Bluetooth devices

Bluetooth devices

In many Bluetooth devices, gaps have been identified, including fitness bracelets or smart home devices. The errors found can be used to cause a failure or to give the attacker the right to read and write data. Singapore researchers have informed device manufacturers so many of them have prepared or are preparing patches. The main challenge will be to make sure that people who should manually update their software do so. The comforting situation is that an attack on these holes cannot be made via the Internet. The attacker must be near the attacked device. However, the biggest problem is medical devices. Attacks can be made on pacemakers, glucose monitors, and drug delivery devices. Meanwhile, the holes allow them to fail, force restart, and block them or take control over them. The latter method of attack poses the greatest