Cloud Consultancy News
How can we thwart email-based social engineering attacks?
More than 99 percent of cyberattacks rely on human interaction to work, Proofpoint recently shared. More often than not, the principal attack method is phishing emails. When hitting enterprises, attackers love to impersonate Microsoft the most, as Office 365 is...
Holiday Booking Sites Hit by Skimming Attack
People using mobile apps to book hotel rooms for their vacations have been targeted by a skimming attack. Research by cybersecurity company Trend Micro discovered that a series of incidents took place earlier this month in which the booking websites of two well-known...
Key threats and trends SMB IT teams deal with
MSPs are significantly more concerned with internal data breaches and rapidly evolving technology practices, whereas internal IT teams are more concerned with employee behavior/habits, according to a Central by LogMeIn report. The global survey, which polled 500 IT...
What is Malware Flux and How Can You Avoid it?
Cybersecurity has developed a lot recently, especially from a software perspective. From private usage to enterprise cybersecurity, the whole sector has drastically evolved and improved in the past couple of years. Although this may sound positive, it must be pointed...
Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website
Unlike in the pre-internet era, when trading in the stock or commodities market involved a phone call to a broker — a move which often meant additional fees for would-be traders — the rise of trading apps placed the ability to trade in the hands of ordinary users....
83.8% UK IoT devices send user data to third-parties including Netflix, Microsoft, and Google
56 % of the US IoT devices and 83.8 % of the UK devices are exposing information to third-parties. The most common data shared by IoT devices to third-parties include location data and IP addresses. What was the study about? Researchers from Northeastern University...
Windows Defender Antivirus Scans Broken After New Update
Update: This issue is now resolved in "Security Intelligence Update for Windows Defender Antivirus - KB2267602 (Version 1.301.1684.0)" definitions. Microsoft has released a new update for Windows Defender that has broken both the Quick and Full antivirus scans. When...
Researcher discovers 15,000 private webcams that can be possibly exploited
Wizcase, a firm that evaluates cybersecurity products, has uncovered 15,000 potentially accessible webcams, with many of them located inside people’s homes. These webcams are vulnerable to access and manipulation by hackers. This was discovered by Avishai Efrat, a...
WhatsApp’s ‘Delete for Everyone’ feature doesn’t delete images or videos sent to iPhone users
WhatsApp ‘Delete for Everyone’ feature claims to ‘unsend’ media files such as photos and video mistakenly sent to recipients. However, the feature for iOS has not been designed to delete the media files sent to iPhone users (with default settings). An application...
Simjacker: Critical SMS-based vulnerability that can spy on mobile phone users reported
Researchers have discovered an SMS-based vulnerability that allows the tracking of mobile phone locations. Named Simjacker, this vulnerability is said to have been exploited for at least the past two years in multiple countries. The backdrop AdaptiveMobile Security...