A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers to comprehend the state of online privacy in 2018. The report reveals a significant knowledge gap and suggests that, despite their fears, US citizens are not protecting themselves against the ever-growing amount of cyber-threats. In light of the 2018 information breaches and revelations, consumers were asked to detail their cyber hygiene habits. There is a significant distrust of social media platforms; 45% of consumers report feeling uncomfortable about using platforms that track and sell their information. … Read more
Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to have especially honed its assault abilities to attack cryptocurrency-related organizations. In the face of mounting and crippling international sanctions, Pyongyang’s many hacker groups have adopted cryptocurrency-focused malicious attempts as an effective way of generating income to the reclusive country. Security specialists at Group-IB consider that the infamous North Korean Hacker group Lazarus accounts for targeting strikes against five cryptocurrency exchanges. According To security researchers in Recorded Future, even as Pyongyang’s ruling elite have gotten better … Read more
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in many IoT hardware products has newly identified vulnerabilities. The vulnerabilities are in the TCP/IP stack and affect the FreeRTOS. The versions affected The versions affected are FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), AWS FreeRTOS up to V1.3.1, OpenRTOS and SafeRTOS (With WHIS Connect middleware TCP/IP components). Why this is a disaster FreeRTOS is used in many IoT devices. These devices are often inexpensive and not easily patched. In fact, many of these devices have firmware that has not been updated for many years. Examples of … Read more
Another successful ransomware attack…. The City of West Haven, Connecticut made the tough decision to pay hackers $2,000 in ransom money after a ransomware attack halted all their operations. The city contacted the Department of Homeland Security who discovered the attack originated outside of the U.S. West Haven mayor Nancy Rossi said the attack disabled around 23 servers last week which led their local officials deciding to pay the $2000 in Bitcoin to unlock their servers.
According to research by Kaspersky Lab, 86% of Cybersecurity professionals think that hackers are not stoppable and will eventually succeed at compromising the systems that the cyber pros are hired to protect. In my opinion, this awareness of the seriousness of the threat is admirable. Such an attitude should keep us all on high alert. On the other hand, the view may also become a self-fulfilling prophecy. The most significant risks come from two groups: criminal gangs and insider threats. Criminal gangs of hackers are generally motivated by financial gain. These types of breaches happen every day. Most of these … Read more
Malware is short for “Malicious Software” and has been around for a very long time. Way back in the 1980s, trojans and other types of malware were distributed on floppy disk to unsuspecting users. Malware can be used to destroy data, destroy hardware, steal information, create zombies (computers that hackers can control remotely), and other things that you do not want to happen! There are many types of malware, but I have listed and defined each of the most common types of malware that you will see in the wild. Which are the most Frequent Kinds of malware? Adware is … Read more
Everyone is talking about the Bloomberg Businessweek’s volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report is not standing up to the smell test. As president Trump would say – This is fake news. Apple, Amazon, and the other involved parties delivered strong denials. If these companies saw any potential truth in the article they would have not issued such strong denials. For one thing – if there was any truth in the article then each of these companies would have a high liability for misleading the public with the denials. … Read more