Cloud Consultancy News
Phishing Attack Pretends To Be An Office 365 Non-Delivery Email
A phishing campaign has been discovered that pretends to be a non-delivery notification from Office 365 that leads you to a page attempting to steal your login credentails. This new campaign was discovered by ISC Handler Xavier Mertens and states that "Microsoft found...
Iranian Phishers Bypass 2FA Protections Offered By Yahoo Mail And Gmail
A recent phishing campaign targeting US government officials, activists and journalists is notable for using a technique that allowed the attackers to bypass two-factor authentication protections offered by services such as Gmail and Yahoo Mail, researchers said...
How to Set a Custom Background Picture in Chrome
When you open a new tab in Chrome, there are several different ways you can configure what appears. You can have it show you frequently visited sites, news headlines, or maybe you prefer to keep things simple and leave it plain. But if you enjoy images, Chrome allows...
Android Trojan Steals Money From Victims’ PayPal Account
ESET researchers have unearthed a new Android Trojan that tricks users into logging into PayPal, then takes over and mimics the user’s clicks to send money to the attacker’s PayPal address. The heist won’t go unnoticed by the victim if they are looking at the phone...
November 2018: Most Wanted Malware Exposed
Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it spread through several campaigns, including a Thanksgiving-themed campaign. This...
6.8% Of The Top 100,000 Websites Still Accept Old, Insecure SSL Versions
Mac-based malware has appeared on the list of the top ten most common types of malware for the first time in WatchGuard’s quarterly Internet security report. The Mac scareware appeared in sixth place in WatchGuard’s latest Q3 2018 report and is primarily delivered by...
Dell Will Be Publicly Traded Again in December
Dell Technologies will become a public company again December 28. The company said it received shareholder approval to buy back a tracking stock that's linked to its stake in VMware. In a nutshell, Dell will close the deal December 28 and its C shares will trade on...
UK Businesses Being Let Down By The Government On Cybercrime
Businesses in the UK think the government should be more focused on helping them deal with cybersecurity issues. This is according to a new report from RedSeal, which says a sensitive political and business environment this year has deflected attention away from...
Using A Password Manager: 7 Pros And Cons
Source: CSO from IDG Author: Roger A. Grimes I’ve written about what I consider the best current password advice for websites and services you need to keep secure. In a nutshell, here’s the advice again: - Use multi-factor authentication (MFA). - Where MFA is not an...
National Cyber Security Centre – N > Z Glossary
N network Two or more computers linked in order to share resources. P patching - Applying updates to firmware or software to improve security and/or enhance functionality. pentest - Short for penetration test. An authorised test of a computer network or system...