Uncategorized

RDP most used for ransomware attack in 2020

The top three most popular intrusion methods include unsecured RDP endpoints, email phishing, and the exploitation of corporate VPN appliances. Ransomware attacks targeting the enterprise sector have been at an all-time high in the first half of 2020. RDP is regarded as the single biggest attack vector for ransomware. Remote Desktop Protocol (RDP) is currently […]

Uncategorized

28,000 printers hacked for security awareness

CyberNews cyber security experts hijacked nearly 28,000 unsecured printers worldwide and forced them to print a printer security manual. How to secure a printer? Limit or disable network printing; Secure your print ports; Use a firewall; Update your printer firmware to the latest version; Change the default password to a strong passphrase. Read more on […]

Data Breach Privacy

Former Uber CISO charged for concealing hack

Yesterday Uber’s former security chief Joe Sullivan was charged with attempting to conceal a hack from federal investigators. This hack exposed the email addresses and phone numbers of 57 million drivers and passengers. As a result the former CISO could face up to eight years in prison for not promptly disclosing to the employee and […]

Hackers Privacy

Spy on satellite broadband traffic using $300?

Transmitted information via satellite broadband connections – something that’s useful in areas where fixed internet connections might be slow or non-existent – could get their traffic sniffed, potentially putting usernames and passwords into the hands of attackers, as well as the ability to track sensitive but often not encrypted information about individuals or corporations. You […]

Privacy Security

FBI: how to recognize malicious web stores?

The FBI has provided Internet users with tips for recognizing malicious web stores. According to the U.S. Service, there is an increase in the number of victims being tracked down through fake online stores. The US regulator FTC also reports an increase in the number of shoppers who do not receive ordered goods. These include […]

Privacy Security

8 recommendations for working from home safely.

Safe working from home not under control? Then follow the following 8 recommendations to work from home safely: Set up two-factor authentication for administrators. Set up two-factor authentication for regular users. Avoid using administration rights with normal users. Record what users do within your environment. Set ‘alerts’ to receive notifications about strange activities. Know the […]