Category Archives: Hacking

How to protect your Windows computer from the Petya ransomware attack

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday.

While Petya has not infiltrated as many machines as ransomware WannaCry did in May, it is more dangerous and has the power to create more damage. Here’s how to protect yourself and your small business from attacks like Petya.  Read more.

Advertisements

China Stole Data From Major U.S. Law Firms

A series of security breaches that stuck prestigious law firms last year was more pervasive than reported and was carried out by people with ties to the Chinese government, according to evidence seen by Fortune.

Read more.

Cybersecurity and 8 Steps to Preparing for the Inevitable

There is no mistaking it, cybersecurity and data breaches are now front and center of everyone’s mind. Just in the last month we have seen two governments—the Philippines and Turkey—get hacked, not to mention the massive amount of government-shaking data leaked as part of the Panama Papers.

We have also seen governments creating more legislation around cybersecurity strategies, a good indication that they are trying to keep up with the times. For example, Australia just launched its new strategy in the later part of April.

Read more.

How to Destroy a Hard Drive, Permanently

This time last week FBI divers were searching Seccombe Lake, a freshwater lake about three kilometers from the Inland Regional Center, the site of December 2 shooting that left 14 dead and 22 injured. Reports indicated that shooters Tashfeen Malik and Syed Rizwan Farook had ditched their laptop hard drive, which may contain e-mails and other evidence, in the murky water around the time of the attack.

Read more.

U.S. Takes Down Crime Ring That Infected Over 500,000 Computers

A U.S.-led international operation disrupted a crime ring that infected hundreds of thousands of PCs around the globe with malicious software used for stealing banking credentials and extorting computer owners, the Justice Department said on Monday.

Authorities in nearly a dozen countries worked with private security companies to wrest control of the network of infected machines, known by the name of its master software, Gameover Zeus.

Read more.

Internet Explorer Bug Lets Hacker Control Your PC

If you’re using Internet Explorer and click on the wrong link, a hacker could hijack your computer.

Microsoft (MSFT) is racing to address a weakness in its popular Web browser that security experts at FireEye (FEYE) revealed over the weekend. The researchers discovered that hackers have exploited the bug and created a new type of attack.

Read more.

Twitter Launches Operation ‘Forward Secrecy’

Reports of corporate espionage by the National Security Agency just keep rolling in, and San Francisco-based microblogging site Twitter Inc. is stepping up its game to protect the data of its users.

Twitter’s plan is to use “forward secrecy,” a security measure that prevents hackers from decoding users’ encrypted data. “If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic,” the company explained in a blog post.

Read more. 

The Seven Deadly Social Engineering Vices

You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well?

Your own observations show you that people are very different. Some are always enthusiastic and willing to learn something new. Others are more conservative but courteous to their co-workers. A bit further down this scale are people that always looks like they are bored with life and then at the bottom are those who just don’t care and basically are in apathy about everything.

Read More.