Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …
Air Canada Customers May Have Had Their Data Exposed
If you fly Air Canada and use their mobile app, it may be time to change your password. The company recently announced that between August 22nd and August 24th of this year, they detected “unusual log-in behavior,” and that a small fraction (some 20,000) of their 1.7 mobile app users …
Hacker Requests For Wire Transfers Are Topping Email Scams
Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …
New Versions Of Ransomware Continue To Wreak Havoc
2017 was “The Year of Ransomware.” It saw an incredible number of ransomware attacks and infections, paired with a tremendous number of innovations. Although 2018 hasn’t seen quite the same level of ransomware activity, it’s still a major threat with one company coming under attack about every ten minutes. Although …
Some Apple iPhone 8’s May Have A Manufacturer Defect
Do you own an iPhone 8? If so, you may have problems. Apple has recently reported that a small percentage of iPhone 8s “contain logic boards with a manufacturing defect. Affected devices may experience unexpected restarts, a frozen screen, or won’t turn on.” The company has isolated the defect to …
Most Small Businesses Can’t Recover From Cyber Breaches
A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …
Vulnerability Found In Major Manufacturers Of Android Phones
Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you’re not sure what an “AT Command” …
Security Issues Abound – Texas Voter Registration Records Leaked
The great state of Texas has 15.2 million registered voters. Unfortunately, personal details belonging to nearly all of them (14.8 million) have been compromised, but don’t blame the state’s election officials. This staggering breach was caused by the carelessness of a conservative-focused data firm, ironically named “The Data Trust.” They …
Hackers Now Targeting Point Of Sale Systems
There’s a new threat to point of sale (POS) systems coming out of Russia, according to security researchers from Booz Allen Hamilton. The malware, which they’re calling “RtPOS” isn’t bleeding edge technology, and does not approach the level of sophistication of other recently discovered strains, but that doesn’t mean it …
Hackers Make More Money Than Is Spent On Cybersecurity
Quick question – how much do the world’s cyber criminals make every sixty seconds? If you guessed a quarter of a million dollars, you’d be wrong. If you doubled that value, you’d be wrong again. According to research conducted by RiskIQ, cybercriminals are raking in a cool million dollars per …