Forget These Cyber Security Myths Right Now
There are 2 myths that stand in the way of boards understanding the threats posed by cyberattacks and ensuring their businesses can be safe against cybercriminals and hackers.
There are 2 myths that stand in the way of boards understanding the threats posed by cyberattacks and ensuring their businesses can be safe against cybercriminals and hackers.
Recently, Scott County Schools, in Kentucky, fell victim to a $3.7 million fraud phishing scam. According to Superintendent Dr. Kevin Hub, a vendor informed the district that an invoice sent to the district had not been paid. In looking into the matter, the district found that someone else had been paid instead, via a fraudulent email disguised as the vendor.
“This is a process that we use currently in Scott County Schools. It’s a way that we pay our vendors. And it was in this specific case, a single case, that we can verify, and this fraudulent email and fraudulent documentation is what caused this crime to happen.”
Recently a vulnerability was disclosed that affected millions of Huawei-manufactured laptops. The Chinese manufacturer claimed the vulnerability was a mistake and, in January, patched the affected software. Speculation was rife that this vulnerability might have been injected intentionally with the goal of allowing the Chinese government to exploit it in order to take control of laptops globally at a time of their choosing.
Does the offer to “Never pay for cable again” sound tantalizing?
It shouldn’t. It should sound abhorrent, not only because of piracy is illegal and unfair to content creators, but also because researchers have found that pirated streaming devices are stuffed with malware and/or open the door for it to come streaming in.
Threat detection and response is difficult and only getting more complicated. According to ESG research, 76% of cybersecurity professionals claim that threat detection and response is more difficult today than it was 2 years ago, so this situation may only get worse in the future.
WordPress itself is designed to keep your website safe, but there is always more you can do to protect it yourself and your livelihood. The minute you let it slip your mind, you are compromising your online presence.
An alert from the Carnegie Mellon University CERT Coordination Center (CERT/CC) has warned that numerous enterprise VPN clients could be vulnerable to a potentially serious security weakness that could be used to spoof access by replaying a user’s session.
For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses. The question remains – which protects which?
Facebook has around 2.38 billion active users every month, 65% of which are on the platform on a daily basis and are sharing 4.75 billion pieces of content every day. That’s some statistics for you! Now let’s put it in context. How many of those 4.75 billion messages or photos do you think contain some form of malware? And how many of those 1.56 billion daily users do you think might have malicious intentions aimed at you or other Twitter users? We are all in danger everywhere – even in cyberspace – so we must be careful who we communicate with and how. To that end, we give you 4 steps to secure your Facebook account and protect yourself.
A noticeable shift in the methodology for developing malware is taking place, and it can’t go unaddressed. A few years ago, attackers’ primary objective was to avoid detection – second only to making a profit. But recently, these criminals have realized a critical truth: the longer they hold an infected endpoint, the more their profit increases.
© 2017 Awontis. All rights reserved.