Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …
New Versions Of Ransomware Continue To Wreak Havoc
2017 was “The Year of Ransomware.” It saw an incredible number of ransomware attacks and infections, paired with a tremendous number of innovations. Although 2018 hasn’t seen quite the same level of ransomware activity, it’s still a major threat with one company coming under attack about every ten minutes. Although …
Most Small Businesses Can’t Recover From Cyber Breaches
A new study recently published by Sitchfast Technologies paints a grim picture of the threat landscape for small and medium-sized business. Their key finding? A staggering 60 percent of small businesses that suffer a data breach of any magnitude go out of business within six months. Worse, one business owner …
Vulnerability Found In Major Manufacturers Of Android Phones
Researchers operating out of the University of Florida, Stony Brook University and Samsung Research America have made a disturbing discovery. Millions of Android smartphones manufactured by eleven different OEMs (Original Equipment Manufacturers) were found to be vulnerable to attack via AT Commands. If you’re not sure what an “AT Command” …
Security Issues Abound – Texas Voter Registration Records Leaked
The great state of Texas has 15.2 million registered voters. Unfortunately, personal details belonging to nearly all of them (14.8 million) have been compromised, but don’t blame the state’s election officials. This staggering breach was caused by the carelessness of a conservative-focused data firm, ironically named “The Data Trust.” They …
Hackers Now Targeting Point Of Sale Systems
There’s a new threat to point of sale (POS) systems coming out of Russia, according to security researchers from Booz Allen Hamilton. The malware, which they’re calling “RtPOS” isn’t bleeding edge technology, and does not approach the level of sophistication of other recently discovered strains, but that doesn’t mean it …
Hackers Make More Money Than Is Spent On Cybersecurity
Quick question – how much do the world’s cyber criminals make every sixty seconds? If you guessed a quarter of a million dollars, you’d be wrong. If you doubled that value, you’d be wrong again. According to research conducted by RiskIQ, cybercriminals are raking in a cool million dollars per …
High Frequency Audio Computer Monitors May Expose Screen Activity
It may sound like something straight out of a science fiction movie, but recently, researchers have made a disturbing discovery. Using nothing more than an off-the-shelf microphone, it’s possible for an attacker to determine what content you’re viewing on your computer monitor. The researchers tested a variety of LCD screens …
Millions Of T-Mobile Customers Data May Have Been Leaked
Telecommunications giant T-Mobile is the latest victim of a large-scale data breach, with personal data belonging to more than two million of its customers having been leaked. The exposed information included customer name, phone number, email address, billing zip code, account number and whether the account was pre-paid or post-paid. …
Android Malware Could Access Your Pictures And Calls
Android users have a new threat to contend with, according to a sixteen-page whitepaper outlining a new malware strain. The paper was published by a group of security researchers working for Bitdefender. They identified a robust new strain of malware called “Triout.” According to the report, although they just discovered …