Six 2018 security predictions from the security experts at Beyond Security
Here are the top six predictions for 2018 from Beyond Security.
Here are the top six predictions for 2018 from Beyond Security.
The URL’s hilariously go back to METflix, not Netflix.
Systems affected by this ransomware include human resources, finance, parks and recreation, social services and more.
The hack was bad enough, paying the hackers $100,000USD to keep quiet is just adding fuel to the fire.
BadRabbit is moving through networks in Russia, Turkey, and Bulgaria locking down computers and asking for Bitcoin payment.
The Department of Homeland Security and the FBI say that nuclear, energy, aviation, water and critical manufacturing have all been targeted as early as last May.
Verizon, the new owner of Yahoo, has verified that all Yahoo accounts were hacked.
Whole Foods is the second retailer this week hit by a cybersecurity breach.
Unfortunately, the companies that are holding our personal data have to be on thier toes 24/7 in order to protect that data.
It’s sort of mind-boggling to think an institution that large and with so much power over your credit scores could be so irresponsible.
Equifax’s security measures are most certainly in need of some serious scrutiny.
No matter if you are talking about physical security, identity management, or authorization, authentication is one of the most crucial elements of any security strategy.
Skyhigh has been tracking exactly this kind of hacker that launched a ‘Super Attack’ against Office 365 accounts of 48 Skyhigh enterprise customers.
CUJO does a great job of blocking sites and hacking attempts across all your connected devices to help keep your network safe from malware and hacking.
An increase in ransomware and viruses is coming for Mac users.
Be careful out there in social media land, not everything is as it seems!
This operation is run by Rafotech, a large digital marketing agency based in Beijing.
The company says they are investigating further and are involving law enforcement.
According to the New York Times, the Pentagon is worried that hackers are ramping up their social media presence in order to break into DoD computers.
In the end, Hunt believes the Turkish Crime Family may have around 53,000 actual accounts that weren’t in previous data dumps.
The group claims that money isn’t their main motivation for the planned attack. They also claim they are accessing more Apple databases day by day.
One of the defendants also used his access to Yahoo’s networks by searching out credit and gift card numbers to make a financial gain.
Yahoo has not given any indication just how many users have been affected by this flaw or how may users have had their accounts accessed by outside sources.
Chase eATM machines debuted over a year ago, replacing ATM machines like these.
In the Morton, Illinois, case, the target did indeed send the information requested, which included district employees social security numbers.
It will be some time before all library services are back up and running.
Ordinarily, if you clicked those ad links, you would be directed to the company who placed the ad (YouTube, Best Buy, Verizon etc.).
Once you’ve entered your credentials into the fake Gmail login page, the thieves jump into action and are able to login to your Google account.