Of Hacks & Keyloggers – Part 1
Of Hacks & Keyloggers…!!! “I don’t know what happened!; I don’t remember visiting any dodgy websites, downloading any weird apps, opening any suspicious emails or attachments, let alone links!, why I am receiving these sms & email notifications from my Bank!?!?” Sounds familiar right? Come to think of it, in most cases the unsuspecting victim is being honest. That being said, I just remembered something; a previous write up revolving around one of the methods used to carry out this type of attack. It can happen to anyone, in fact I was once a victim!
What is a keylogger?
A keylogger is basically a hardware device or software application that captures every key you press on your keyboard. Logging is done secretly, in such a way the victim (person using the keyboard) is unaware that their actions are being recorded or monitored. Keyloggers are usually installed to Read More
10 Steps to Cyber Security
10 Steps to Cyber Security
Author/Researcher: National Cyber Security Centre
Overview: Defining and communicating your Board’s Information Risk Regime is central to your organisation’s overall cyber security strategy. The National Cyber Security Centre recommends you review this regime – together with the nine associated security areas described below, in order to protect your business against the majority of cyber attacks. Read More
The ‘Security by’ model approach
Passionate about it! Intrigued by it! Confused by it! SaaS, RaaS, XaaS, what! what!, okay let me PaaS, oops meant pass! Unlike the as-a–service model that inherently loves prepending strange InfoTech words, I am going to talk about another model, that seems to enjoy appending weird random like words; the ‘Security by’ model! Don’t you just love it? Oops, I meant I.T! Security by Obscurity, Security by Isolation, Security by Default!; The ‘Security by’ model approach!
The ‘Security by’ model approach seems to share and rely on; Read More
MyBitSecure – Codename ‘D3m0’ Project
Have you ever had a brilliant I.T Security idea, which you needed an expert to tailor-make for you but where hesitant to pursue because you felt that you might end up not liking the idea / product at a later stage, or because of your fear of the costs involved? Well, look no further, The MyBitSecure Team will not only built an awesome custom solution for you, but will make arrangements to initially give you the Hardware-based security solution as a Demo unit to test drive (at no costs) for at least two weeks before you make your final decision. Below is a list of MyBitSecure’s I.T Security solutions on Demo! More
Do You Need a WordPress Security Plugin?
At Wordfence we are a big team these days with millions of customers, and we think about security all day long. Sometimes we can get deep down the proverbial rabbit hole and forget about the basics.
I recently overheard someone asking “Do I really need a WordPress security plugin?” and I realized this is a perfectly valid question. If you are not in the security industry, you might ask it.
I know that many of you are well versed in security already – and WordPress security in particular. Perhaps that is why you are Read More
How to Protect Yourself From Ransomware
The ransomware industry has exploded recently. Often, hackers demand bitcoin payments in order to restore computer systems. Bitcoin.com investigates what to do to prevent ransomware attacks.
A report by McAfee Labs published in December revealed that the number of new ransomware samples totaled 3,860,603 in the third quarter, which is an 80% increase from the beginning of the year. With a huge jump in the number of ransomware attacks coupled with significant technical advances in this area, the company predicted that “2016 may be remembered as ‘the year of ransomware’.”
These malicious software programs Read More
Attacks on Data Privacy May Get Scarier in 2017
The U.S. federal government is making substantial advances towards accessing encrypted smartphone data. If authorities get their way, it could lead to severe privacy implications for bitcoin users.
A recent Florida court proceeding details a man named Aaron Stahl was allegedly using his iPhone to take pictures up the skirt of a woman while she was walking around a store. Law enforcement had obtained Stahl’s iPhone but was unable to access the data without his permission. At first, the court said that Stahl could not be coerced into handing over his phone’s passcode due to Fifth Amendment rights violations. However, a three-judge panel Read More
Business Cyber Attacks Top 4,000 Per Day: Your Guide to Ransomware
Counsel your employees: Next time they encounter email claims that “payment is overdue” or your company is “in litigation,” don’t open any links!
Earlier this month, I received a call: Yet another company had become a victim of ransomware. The type of malware involved was one hackers commonly use to encrypt data on employees’ or companies’ computers. They then demand ransom, usually in Bitcoin, to unlock the information or the computers.
What is Bitcoin? A Step-By-Step Guide For Beginners
An in-depth guide by BlockGeeks – Blockgeeks.com
If you want to know what is Bitcoin, how you can get it and how it can help you, without floundering into technical details, this guide is for you. It will explain how the system works, how you can use it for your profit, which scams to avoid. It will also direct you to resources that will help you store and use your first pieces of digital currency.
What is Bitcoin in a nutshell
Small wonder that Bitcoin emerged in 2008 just after Occupy Wall Street accused big banks of misusing borrowers’ money, duping clients, rigging the system, and charging boggling fees. Bitcoin pioneers wanted to Read More
Ransomware: Expert advice on how to keep safe and secure
Ransomware is malicious software that criminals use to hold computers or computer files to ransom, demanding payment from victims to get them back. Sadly, ransomware is an increasingly popular way for malware authors to extort money from companies and consumers alike.
The Best Password Managers of 2016
When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from all kinds of cyber-threats.
Today majority of Internet users are vulnerable to cyber attacks, not because they aren’t using any best antivirus software or other security measures, but because they are Read More
Securing your data with VeraCrypt
One of the best ways of keeping people out of your private accounts or preventing unauthorised local access to your personal information is by not letting them on your Desktop or Laptop in the first place, but how do you go about it? Well, it’s straightforward, you create a password! Is that it?, well ‘sort of’, is the response I usually get. Of particular interest is one of the most common misconceptions “I like to call it – False Sense of Security!”, that is, colleagues who usually boast their user profiles are impenetrable because they have ten+ (10+) character long passwords, but then again, what happens if passwords fail you? Ask me and I will tell you it’s simple! Securing your data with Read More
Panda antivirus labels itself as malware, then borks EVERYTHING
11 Mar 2015 at 16:52, John Leyden – The Register
Spanish security firm in baffling tail-chasing auto-immune kerfuffle
Panda users had a bad hair day on Wednesday, after the Spanish security software firm released an update that classified components of its own technology as malign.
As a result, enterprise PCs running the antivirus software tied themselves in something of a knot, leaving some systems either unstable or unable to access the internet. A Panda spokesman confirmed the problem while advising that the issue was well in hand.
“A bad update was published temporarily today [Wednesday] that resulted in some system files being detected by the Panda engine, a replacement update was promptly published removing the error and restoring the wrongly quarantined files,” a Panda representative told El Reg.
“At present we recommend Read More