Back-to-Basics: Keep Software Patched

Back-to-Basics: Keep Software Patched

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

3 Tips to Protect Yourself From XLoader Malware | McAfee Blogs 3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware | McAfee Blogs 3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

3 Tips to Protect Yourself From XLoader Malware

3 Tips to Protect Yourself From XLoader Malware

Picture this: you open your MacBook and see an email claiming to be from your favorite online store. In the email, there is an attachment with “important information regarding your recent purchase.” Out of curiosity, you open the attachment without checking the recipient’s email address. The next thing you know, your device is riddled with malware.   Unfortunately, this story is not far from reality. Contrary to popular belief, Apple computers can get viruses, and XLoader has Mac users in their sights.  …

Read More

Cybersecurity professionals: Positive reinforcement works wonders with users

Cybersecurity professionals: Positive reinforcement works wonders with users

The blame game is not working; experts suggest using positive reinforcement to improve employee attitude and performance. Image: iStock/jauhari1 With all the negativity in the world, it feels like a good time to remind everyone that positive reinforcement is an effective tool for improving employee behavior when it comes to cybersecurity. SEE: Security incident response policy (TechRepublic Premium) To keep everyone on the same page, let’s use the definition championed in Courtney E. Ackerman’s PositivePsychology.com…

Read More

DDoS attacks largely target the US and the computers and internet sectors

DDoS attacks largely target the US and the computers and internet sectors

DDoS attacks are a nuisance to be sure, but they’re also used in a variety of ways that make them a severe threat, says Atlas VPN. Timur Arbaev DDoS attack data presented by Atlas VPN found that attackers prefer the United States and the computers and internet sectors as targets. In June 2021 alone, more than a third of DDoS attacks worldwide targeted servers in the U.S. DDoS attacks involve using a massive number of…

Read More

Anomali Cyber Watch: LockBit ransomware, Phony Call Centers Lead to Exfiltration and Ransomware, VBA RAT using Double Attack Vectors, and More

Anomali Cyber Watch: LockBit ransomware, Phony Call Centers Lead to Exfiltration and Ransomware, VBA RAT using Double Attack Vectors, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Android malware, APT, Data leak, macOS malware, Phishing, Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed….

Read More

Olympic-themed passwords put people at risk

Olympic-themed passwords put people at risk

Beyond using “tokyo” and “olympics” as their passwords, people have been turning to names of athletes, such as “kenny,” “williams,” and “asher,” says NordPass. Image: Mackenzie Burke Devising passwords for your website accounts is always a challenge. That’s why many people look to current events for inspiration. But that strategy is a recipe for trouble as it often leads to simple and weak passwords, making you easy prey for cybercriminals. A report released Tuesday by…

Read More
1 2,304 2,305 2,306 2,307 2,308 2,730