Category:

“Gold Galleon” Nigerian hackers plunder global shipping industry

Researchers have identified the hacking group behind several wide-scale business email compromise (BEC) attacks gouging the maritime shipping industry millions of dollars since last year. Attackers are taking advantage of the industry’s lax security and the use of outdated computers, according to a report released by RSA. Researchers estimate that Gold Galleon has specifically targeted the shipping industry in an attempt to steal at least $3.9 million between June 2017 and January 2018. Gold Galleon’s targets include maritime shipping organizations – such as companies providing ship management services, port services and cash Continue Reading

Posted On :
Category:

Cargo ships ripe for hacking

Living on an island, we rely on ships to bring us everything from food to Amazon orders. With the shipping the industry being the main conduit for global trade, moving over 10 billion tons of goods annually between seaports, officials say that this trillion dollar industry is open to cyber attack and its ripe for the picking. Ships are low hanging fruit as incredibly high-value cargo is transported on ships with legacy systems and poor security processes and awareness. In fact the seaports they dock in offer suffer from these same problems. Continue Reading

Posted On :
Category:

City of Atlanta currently being held hostage by cyber criminals

It’s not a good day for the city of Atlanta. Officials in Atlanta say the city’s computer systems are not yet fully operational after a ransomware attack hit the city last week and locked some city data behind a wall of encryption. They’ve been working “around the clock” to get systems back on-line, including city email, internet and many departments such as the courts, jails and utility bill payments are being run the old fashioned way – with pen and paper. Hackers are demanding a $51,000 ransom to restore access Continue Reading

Posted On :
Category:

Do You Own a 4 Leaf Lucky Clover?

A Four-Leaf Clover Won’t Cut It: 4 Steps to Handling Your Cybersecurity This Year You may play the lottery in the hopes of winning. You may even hold back on a new purchase, leaving it in the hands of fortune to give you a better deal on Black Friday. But your data’s security is never something to leave up to chance – not with today’s huge number of complex cyber attacks. In 2017 there was a hacker attack every 39 seconds, affecting one in three Americans and 43 percent of those attacks Continue Reading

Posted On :
Category:

4 ways to keep thieves out of your bank account

The number of debit cards compromised at ATMs and merchant card readers rose 10 percent in 2017, according to FICO. To limit fraud risk, experts say, consumers should avoid using a debit card for purchases. Paying with a debit card for purchases is one way that budget minded consumers can keep a lid on their spending. You’ll notice that ALL major retailers such as supermarkets and drugstores have DEBIT chosen automatically as the default payment method at check out. This has saved them millions of dollars in transaction fees and Continue Reading

Posted On :
Category:

Ransomware spreading rapidly via fake IRS emails

A new variant of ransomware is spreading rapidly around the globe be emails impersonating the Internal Revenue Service. The email subjects look like “Please Note – IRS Urgent Message-164” and the email body states that you’re behind in real estate taxes and to open the attached file for a compiled report of how much you own. Don’t fall for it. Opening the attached .zip file downloads a malicious payload that quickly encrypts all of your computer’s important files, then demands a ransom to be paid in untraceable BitCoin before you can get Continue Reading

Posted On :
Category:

7 ways to stay safe online on Valentine’s Day

Looking for love in all the wrong places? Here are some helpful tips for safeguarding yourself while trying to find love on the internet. Valentine’s Day brings out the softer side in all of us and often plays on our quest for love and appreciation. Online scammers know that consumers are more open to accepting cards, gifts and invitations all in the name of the holiday. While our guards are down, here are a few tips for safeguarding yourself while on your quest to find love on the Internet. 1. Continue Reading

Posted On :
Category:

There may be a fake adult movie out there with you in it

You won’t believe this. Criminals on the internet are expected to soon come out with a new wave of distasteful phishing attacks, specifically targeting women. Using Photoshop to put a face onto a nude body is old news. The latest software now allows extortionists to automatically scour the internet for pictures of you, then digitally manipulate them to create fake adult movies with the star being… you. You might imagine how this will be misused now that these fake videos are exploding in popularity. Bad guys are going to use Continue Reading

Posted On :
Category:

The Cybersecurity ‘Upside Down’

There is no stranger thing than being breached. Here are a few ways to avoid the horror. Any Netflix sci-fi fans out there? For those of you reeled in by Netflix’s Stranger Things, in the series the Upside Down is an alternative reality where none of us wants to be. Landing in the Upside Down diverts circumstances in different, unintended directions and, in some cases, permanently changes lives. As breach headlines and the resulting fallout of these compromises continue to stream in, it’s easy to imagine that the affected companies are Continue Reading

Posted On :
Category:

Six Cyber Threats to Really Worry About in 2018

From AI-powered hacking to tampering with voting systems, here are some of the big risks on our radar screen. Hackers are constantly finding new targets and refining the tools they use to break through even the latest cyber defenses. Wondering what new threats are lurking around the corner for this year? Here are some to look out for 1. More huge data breaches The cyber attack on the Equifax credit reporting agency early last year, which led to the theft of Social Security numbers, birth dates, and other data on Continue Reading

Posted On :