Tag Archives: common

Experts say computer hacks are more common than ever

CORALVILLE, Iowa (KCRG-TV9) “Don’t put anything on the internet that you don’t want anyone else seeing because they probably will at some point,” said Procircular Security Engineer Bryan Prathr-Huff.

Cybercrime is a growing threat and targeting every person and business on the internet. Cybersecurity Ventures predicts cyber crime will cost the world more than 6 trillion dollars in less than five years. That makes it more profitable than all of the major illegal drug trades combined. TV9 looked into how likely you are to become a victim.

While breaches at major corporations get headlines, every day people are becoming increasing targets for hackers. From smart watches to smart cars, we have more devices than ever that are connected to the internet and can be hacked. Cyber security experts say the internet is growing faster than our ability to secure it.

“They’re looking to use your computer or part of your computer to

Read more at: http://www.kcrg.com/content/news/Cybersecurity-experts-say--474000593.html

10 Common Data Breach Attack Techniques

Among the more frustrating aspects of cyber security is the constantly evolving nature of the threat and the multitude of data breach attack techniques. One vulnerability is patched only for another to be found/created; one technique is foiled only for a different tactic to arise. Here we give a brief discussion of motivations and offer a list of the ten most common cyber attack/data breach techniques. Hat tip to the incomparable website Hackmaggedon.com which has been tabulating and compiling cyber attack reports for several years.

There were over 850 data breach attacks in 2017, many of which led to theft of customer personal and financial information. Not only is the number of breaches on the rise, but costs are rising, too. The New York Times reported that, through March 2017, Target spent more than $202 million on settlements, legal fees, and other costs following the November 2013 breach.

Read more at: https://www.jdsupra.com/legalnews/10-common-data-breach-attack-techniques-76900/

"Phishing" Is A Common Type of Cyber Crime – 91.5 KIOS

On this next-to-the-last day of Cyber Security Awareness Month, we look at one type of cyber crime that has become more sophisticated over the years – phishing.  

This is when a cyber criminal pretends to be somebody else in order to get information from you. The Federal Trade Commission says phishing e-mails will often include the trusted logo of an actual company.

Jon Larsen, Systems Engineer at the AIM Institute in Omaha, says the harm from clicking on a link in a “phishing” e-mail can be considerable.

“If you click on the link, it might be taking you to a site that looks like your bank — and if you’re entering in,  it makes it look like your log-in page,

Read more at: http://kios.org/post/phishing-common-type-cyber-crime

Forget Blue Whale Challenge, cyber bullying is more common danger for your kid

Tanya grew up in a Mumbai suburb, like any normal teenager. Unknown to her, a classmate from a previous school had started collecting information and pictures of her since they were 12. The information was then used to make a fake Facebook page, and was shown as if Tanya had posted them herself. Tanya had read about cyber bullying, but had never expected herself to be a victim. She found out about the fake page only through her friends.

Even though the bullying seemed benign in the beginning, soon schoolmates started sending her crude messages and she became isolated from her friends circle. She withdrew to herself, rarely going out, and became depressed. The bullying then got so bad that she had to go for counseling and change schools to start afresh.
Having grown up around gadgets, children rely heavily on them to carry out everyday tasks.

They also

Read more at: http://economictimes.indiatimes.com/tech/internet/forget-blue-whale-challenge-cyber-bullying-is-more-common-danger-for-your-kid/articleshow/60957324.cms

Forget Blue Whale Challenge, cyber bullying is more common danger for your kid

Tanya grew up in a Mumbai suburb, like any normal teenager. Unknown to her, a classmate from a previous school had started collecting information and pictures of her since they were 12. The information was then used to make a fake Facebook page, and was shown as if Tanya had posted them herself. Tanya had read about cyber bullying, but had never expected herself to be a victim. She found out about the fake page only through her friends.

Even though the bullying seemed benign in the beginning, soon schoolmates started sending her crude messages and she became isolated from her friends circle. She withdrew to herself, rarely going out, and became depressed. The bullying then got so bad that she had to go for counseling and change schools to start afresh.
Having grown up around gadgets, children rely heavily on them to carry out everyday tasks.

They also

Read more at: http://economictimes.indiatimes.com/tech/internet/forget-blue-whale-challenge-cyber-bullying-is-more-common-danger-for-your-kid/articleshow/60957324.cms

Ransomware has reached in the hands of common criminals: Take these steps to stay safe

NEW DELHI: In the first week of September, executives of a well-known publishing house met with a sudden crisis which had them seeking help from Delhi Police. The company had inter-connected computers through a common server across their offices in many big cities in India. All files—on more than those 150 computers across their offices—were overnight encrypted by a malware which demanded a high ransom to decrypt the data.

The company had fallen prey to the Locky ransomware, which is believed to have affected millions of computer systems in over 70 countries, including India, in the past month.

Ransomware is a malware that hijacks computers, encrypts important files, denies access to them, and then asks the victim to pay ransoms to have the files decrypted. Ransomware spreads through downloading of malicious email attachments or visiting malicious websites.

In a

Read more at: http://economictimes.indiatimes.com/tech/internet/ransomware-has-reached-in-the-hands-of-common-criminals-take-these-steps-to-stay-safe/articleshow/60868950.cms

cyber crime: Ransomware has reached in the hands of common …

NEW DELHI: In the first week of September, executives of a well-known publishing house met with a sudden crisis which had them seeking help from Delhi Police. The company had inter-connected computers through a common server across their offices in many big cities in India. All files—on more than those 150 computers across their offices—were overnight encrypted by a malware which demanded a high ransom to decrypt the data.

The company had fallen prey to the Locky ransomware, which is believed to have affected millions of computer systems in over 70 countries, including India, in the past month.

Ransomware is a malware that hijacks computers, encrypts important files, denies access to them, and then asks the victim to pay ransoms to have the files decrypted. Ransomware spreads through downloading of malicious email attachments or visiting malicious websites.

In a

Read more at: http://economictimes.indiatimes.com/tech/internet/ransomware-has-reached-in-the-hands-of-common-criminals-take-these-steps-to-stay-safe/articleshow/60868950.cms

Old fashioned physical bullying still more common than cyber …

FACE-TO-FACE bullying is still the preferred method used by school bullies despite the popularity of Twitter and Facebook, according to Oxford University research.

The study conducted by the University’s Internet Institute found less than one per cent of 15-year-olds in England were regularly experiencing cyberbullying compared to 27 per cent being bullied in person.

Lead researcher Dr Andrew Przybylski found that cyberbullying was being used ‘as a new avenue to victimise those already being bullied in traditional ways’.

The team called for interventions that target both forms of bullying in adolescence as well as initiatives to make teenagers more resilient.

Dr Przybylski said: “Despite common perceptions and the growth of the online world for teenagers, our study finds that cyberbullying, on its own, is relatively rare, with face-to-face bullying remaining most common among teenagers.

“Cyberbullying is best understood as a new avenue to

Read more at: http://www.oxfordmail.co.uk/news/yourtown/oxford/15403866.Old_fashioned_physical_bullying_still_more_common_than_cyber_bullying/

‘This is not cyber crime – it’s WAR’ Expert warns hackers exploiting THIS common mistake

Experts are insisting anyone using the worldwide web, through any kind of device, must take immediate action to stop themselves becoming a victim.

Last week the WannaCry malware crippled the NHS computer systems, damaged mail delivery services and hacked into business around the world.

The damage done was immeasurable with patients’ scans not being accessed and surgeries being delayed.

The attackers targeted more than 374,000 systems – and demanded just $74,000 (£57,000) in total.

However, the threat of cybercrime no more than ever must be taken seriously.

Now, experts have revealed simple measures people can take to protect themselves from harm – starting with never giving away personal information online.

Everyday thousands of people freely tap in their address, their name, their occupation and other invaluable data – when companies offer deals on the internet.

But this is being used against people time and time again.

Raj Samani, Chief Scientist McAfee, warned people about their digital tattoo.

He

Read more at: http://www.express.co.uk/news/uk/806981/WannaCry-ransomware-virus-NHS-Microsoft-Windows-Operating-Systems

Hacking is now so common that even small nations are doing it

Russian state hackers get the headlines, but nations across the globe are pouring money into cyber espionage units, a development, security experts say, that is allowing smaller nations to close the espionage gap without the satellites or tech muscle of big nations.

“It’s very inexpensive. It’s very efficient,” said John Hultquist, a cyber espionage analyst who’s studied the growth of hacking among smaller nations for iSight Partners, a division of FireEye, a Milpitas, California, cybersecurity firm.

Hultquist said his firm was tracking several new players, which he declined to identify – “I’d get in trouble for naming them” – that had no prior experience in cyber espionage.

“These would be smaller developing countries that would appear to be building out their own capability,” Hultquist said. “It’s not just the Chinese anymore or the North Koreans. Some of them are quite good.”

Other cybersecurity firms and independent analysts echo FireEye’s findings.

“We’ve

Read more at: http://www.idahostatesman.com/news/politics-government/article147891764.html