Apr 30, 2019 | Cloud Consultancy News
– The new scam operates in a similar manner as the recent ‘The Nasty List’ scam. – The scam begins with Instagram users receiving a message regarding a list of their ‘hot’ photos on Instagram. A new phishing scam called ‘The Hotlist’ has been found...
Apr 29, 2019 | Cloud Consultancy News
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private lives is tricky. It can reinforce ITs added challenge of protecting company assets by having...
Apr 26, 2019 | Cloud Consultancy News
Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an employee, that you’re not putting your company at risk. Humans have always been the weakest...
Apr 25, 2019 | Cloud Consultancy News
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and cyber attacks often go undetected for some time. As energy companies save...
Apr 24, 2019 | Cloud Consultancy News
Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in...
Apr 23, 2019 | Cloud Consultancy News
The French government has developed its own end-to-end encrypted instant messenger (IM) app to replace government employee use of Telegram, WhatsApp, and other third-party IM clients. The app, named Tchap, was launched on April 18, and is available on the official iOS...
Apr 18, 2019 | Cloud Consultancy News
Google’s Chrome browser will get a Reader Mode, similar to the one found in competing browsers like Firefox and the old Microsoft Edge. The feature is currently under development, but Chrome Canary users can test it starting today. Chrome’s Reader Mode...
Apr 17, 2019 | Cloud Consultancy News
The National Cyber Security Centre (NCSC), a part of GCHQ, together with Wayra UK, has launched a national call for start-ups to join its accelerator programme to develop next generation cyber security solutions. Since its launch in 2017, the ‘NCSC Cyber Accelerator’,...
Apr 16, 2019 | Cloud Consultancy News
– Land Lordz, a software-as-a-service platform, helps automate the creation and management of fake Airbnb sites. – It can also send messages to users, advertising the fraudulent listings. Scammers are recently using a powerful new tool named ‘Land Lordz’...
Apr 15, 2019 | Cloud Consultancy News
– Cybercriminals are heavily relying on such type of frauds to steal money from users, especially in Brazil and Mozambique. – Tricksters are using social engineering and simple phishing attack to take control of a victim’s phone. SIM swap fraud is a type...
Apr 12, 2019 | Cloud Consultancy News
While viruses and malware have stubbornly stayed as a top-10 “things I lose sleep over as a CISO,” the overall threat has been steadily declining for a decade. Unfortunately, WannaCry, NotPetya, and an entourage of related self-propagating ransomware abruptly...
Apr 11, 2019 | Cloud Consultancy News
Microsoft has modified the way Windows 10 handles the operation of disconnecting a USB or Thunderbolt storage device. This includes USB thumb drives, external hard drives, flash drives, and even USB data transfer connections established between PCs and smartphones....
Apr 10, 2019 | Cloud Consultancy News
A snapshot of the Locked Shields 2018 overhead dashboard shows if exercise participants are successful in fending off hacker attacks against critical infrastructure. (NATO Cooperative Cyber Defence Centre of Excellence photo) COLOGNE, Germany – NATO’s cybersecurity...
Apr 9, 2019 | Cloud Consultancy News
GCHQ’s Dr Ian Levy: Huawei is ‘engineering like it’s back in the year 2000′ Huawei is facing a ban from the core of 5G networks in the UK over official claims that the security of its communications products is ‘very shoddy’. The claims...
Apr 8, 2019 | Cloud Consultancy News
– The core reason for the compromise of WordPress and Joomla sites could be unpatched vulnerabilities and outdated plugins, themes, or extensions. – Attackers are leveraging a well-known hidden directory present on the HTTPS site for storing and...
Apr 6, 2019 | Cloud Consultancy News
The cyber security market in India is growing exponentially, and is expected to employ over a million professionals by 2025. With 15% of enterprises having experienced a targeted attack and more than 53% losing sensitive data as a result, India’s need for cyber...
Apr 5, 2019 | Cloud Consultancy News
– An internal inspection revealed that the incident is an ‘accident involving insiders’. – Upon detecting the abnormal transaction, Bithumb blocked any deposit or withdrawal requests and secured all cryptocurrency with a cold wallet. What is the issue...
Apr 4, 2019 | Cloud Consultancy News
– The first and foremost step in the Man-in-the-Middle (MitM) attack is to intercept internet traffic before it reaches its destination. – Once the interception is achieved, the SSL traffic has to be decrypted without the user’s knowledge and without...
Apr 3, 2019 | Cloud Consultancy News
If you’ve got a Paypal account, keep your eyes peeled for the latest scam attempt to steal your personal details. The Australian Cyber Security Centre (ACSC) is warning Aussies about malicious emails from scammers pretending to be from Paypal. The scam email informs...
Apr 2, 2019 | Cloud Consultancy News
Cybersecurity demands of SMBs have become both a major risk and revenue opportunity to managed service providers (MSPs). MSPs are at risk of losing their SMB clients if they don’t provide competitive, comprehensive solutions to their clients, according to Vanson...
Apr 1, 2019 | Cloud Consultancy News
Employees currently think of stealing data, or taking corporate data with them, as a similar offence to taking paper clips home – technology, education and reassurance are required to stop this. When people outside of the IT industry hear the phrase ‘data breach’ or a...