Marketing

Attackers place cryptojacking apps in the Microsoft App Store

In January, security researchers from Symantec found cryptomining applications in the Microsoft App Store, but they were published in the store between April and December 2018. It’s not clear how many users downloaded or installed the apps, but they had almost 1,900 user ratings. [ Get inside the mind of a hacker, learn their motives […]

Marketing

Data breaches exposed 5 billion records in 2018.

The number of publicly known data breaches decreased last year compared to 2017, despite harsher breach notification rules going into effect in Europe. The number of compromised sensitive records also went down by more than a third, from 7.9 billion records to around 5 billion. [ How much does a data breach cost? Here’s where […]

Marketing

Users are still terrible with passwords, but popularity of security apps suggests they want to get better

Credit: ID 113724543 © Zdenek Sasek | Dreamstime.com End users have terrible password-management practices but the popularity of security apps suggests their companies are at least trying to change their habits, according to a new survey of application usage. Almost 40 percent of 1200 knowledge workers participating in a Qualtrics survey, conducted as part of […]

Marketing

Business email compromise attacks surge as ransomware trails off

Credit: ID 127607827 © Microvone | Dreamstime.com Growing success with business email compromise (BEC) attacks has spurred cybercriminals to redouble their efforts, with new figures showing that BEC volumes surged to record highs in the last quarter of 2018. The number of such attacks – in which an attacker emulates a trusted superior or co-worker […]

Marketing

Dating site Coffee MeetsBagel warns Aussie users of data breach on Valentines Day

Credit: ID 91722918 © Farbentek | Dreamstime.com A data breach alert is not the message singles want to hear on Valentine’s Day, but that’s what dating site CoffeeMeetsBagel sent to millions of its users on Thursday, in a message warning that their account details were part of a massive cache being sold on an underground […]

Marketing

Cybercriminals are sending your employees Valentine’s Day bouquets of spam

As another Valentine’s Day, surging levels of scam activity are a reminder that this is a prime season for online cybercriminals and scammers to target the lovelorn. More than 4.3 million users attempted to visit romantic-themed fraudulent websites during the first half of February, security firm Kaspersky Lab has reported based on analysis of the […]

Marketing

Chrome 74 will start blocking drive-by-downloads, thwarts malvertizing

Google is moving ahead with plans to block drive-by-downloads from a website iframe, addressing a key method used to stealthily install malware on computers when visiting websites. The move means Chrome users soon can never again expect to visit a site and face the prospect of an unseen iframe in an ad that loads malware […]

Marketing

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data. [ Keep up with 8 hot cyber security trends […]

Marketing

Ex-employee sued by firm after falling for BEC scam

Scottish custom publishing house Peebles Media Group is suing a former employee, Patricia Reilly, for losses stemming from nearly £200,000 of the company’s money she transferred to a business email compromise (BEC) fraudster.  BEC fraud is a huge business that the FBI has attributed to over $12 billion in losses worldwide since 2013. The scam […]

Marketing

What is biometrics? And why collecting biometric data is risky

Biometrics definition Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. Examples of these biometric identifiers are fingerprints, facial patterns, voice or typing cadence. Each of these identifiers is considered unique to the individual, and they may be used in combination to ensure […]