hackers: Here are 12 Ways to Contain a Hack for Yourself and Your Business
- 10/10/22 12:14 PM
Do you have a business? If “yes,” you have to read this. Do you have personal information? “Yes,” you do. In both scenarios, you will find that hackers have you on their radar, and here are 12 ways that you can mitigate the damage caused by a hack. Work with a Professional – It is very possible for a small business to be hacked because staff often did not use professional techs in the first place. So, companies offering breach mitigation and security should be contacted ASAP. These IT professionals, also known as chief information security officers or if virtual are virtual chief
(3 comments)
|
hackers: Russian Hackers: 14 Ways to Protect Yourself and Your Business
- 03/25/22 12:10 PM
What’s happening in the Ukraine is an example of the worst that humanity has to offer. Millions of people being displaced, and thousands being killed. Our collective governments are walking a fine line in order to help prevent loss of life there and here. In addition, Ukrainians, prior dodging bombs and bullets, dealt with cyberattacks and Russian Hackers on a wide scale. Unsurprisingly, the White House and CISA published a directive “There is now evolving intelligence that Russia may be exploring options for potential cyberattacks.” To those in the security community, this is nothing new, we know this is been going on
(15 comments)
|
hackers: A Guide to How Hackers Hack
- 12/27/19 09:53 AM
You have surely heard of hackers, but do you really know how they work? Hackers are well known for being bad guys, though there are certainly good hackers out there too. Here’s a brief guide to help you understand how a hacker can hack: Directions for Hacking are Easy to Come By Hackers don’t have to look far for help, especially if they don’t know much about hacking. First is a well-known website known as Kali Linux. It has a ton of tools available for hackers, and the site features many links to other hacking resources. Of course, people who want to hack
(3 comments)
|
hackers: How to Protect You Frequent Flier Miles NOW
- 11/27/18 06:46 AM
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online. How do Hackers Steal Frequent Flyer Miles? As with other types of ID theft, hackers use info that they have illegally obtained to access frequent flyer accounts. With more data breaches happening than ever before, hundreds of millions of records are exposed, and thus, hackers have great access to the personal info they need to get into these accounts. What do Hackers Do with Frequent Flyer Miles? It
(2 comments)
|
hackers: Meet the FBI’s most wanted Hackers
- 08/27/15 11:34 PM
Want to earn up to $4.2 million? Then find the hackers on the FBI’s most wanted list. Or at least give the FBI information leading to their arrest and/or conviction. These snakes have stolen hundreds of millions of dollars. Here is the list from the hackernews.com: Evgeniy Mikhailovich Bogachev (reward: $3 million) Ironically, one of his aliases is one of the most common (and thus easily cracked) passwords: lucky12345. He’s the brains behind the GameOver Zeus botnet and CryptoLocker Ransomware. Over a million computers were infected with this malware, causing nearly $100 million in losses. Nicolae Popescu (reward: $1 million) From Romania,
(6 comments)
|
hackers: Bank Account depleted, Company sues
- 04/12/15 02:51 AM
Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about $400,000, but the hospital is reeling because the hospital says the bank had been alerted by someone with the Chelan County Treasurer’s staff of something fishy. The bank processed a transfer request of over $600,000—even though the bank was told that this transfer had not been authorized. In short, some say Bank of
(1 comments)
|
hackers: 1 Billion Records hacked
- 04/05/15 03:55 AM
Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report. Some other findings from the report: A little over half the breaches involved credit card numbers, Social Security numbers and other personal information. Most hacking incidents occurred in the U.S. 55 percent of the incidents involved retailers, primarily affecting point of sale systems that lack encryption technology. The private sector, combined with the government, took up 17 percent of the hits.
(1 comments)
|
hackers: Goodguy Hacker Selling Bad Guy hack
- 01/06/15 09:06 PM
Makes you wonder what these guys would have accomplished had they been born during the Renaissance…case in point: Kevin Mitnick, whose genius was so impressive as a cyber criminal (he hacked into IBM, Motorola, Sun Microsystems and other big-name outfits), that after serving prison time, he was hired as a good guy to help security teams develop penetration-proof systems. But Mitnick is now onto another venture: Absolute Zero Day Exploit Exchange. Mitnick wants to sell zero-day exploits (targeted surveillance), for at least a hundred grand each. In a wired.com article, for which Mitnick was interviewed, he states: “Researchers find them,
(0 comments)
|
hackers: 7 Careful Commerce tips when Shopping this Holiday Season
- 12/26/14 08:46 PM
Frosty the Hackman is teaming up this season with the Grinch to scam people out of their money. Shopping online is a godsend, but it brings with it a pristine opportunity to be ripped off. Avoid Phishing Scams. Never click on links inside e-mails even if they’re (allegedly!) from Macy’s, Kohl’s or some other big-name retailer. Scammers can easily make an e-mail appear legitimate. The e-mail inside the message may take you to a website that downloads a virus to your computer. Thwart Visual Hackers. Planning on doing some online shopping on your lunch break? Some hackers steal data by
(0 comments)
|
hackers: Hackers and Banks win, Clients lose
- 11/11/14 08:50 PM
Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack occurred in 2010, but the appeals court’s March 2013 ruling declared that the firm, Choice Escrow and Title LLC, can’t hold its bank accountable. The victimized firm might even have to pay the bank’s attorney fees. The court says that the firm failed to abide by the bank’s recommended security procedures. BancorpSouth Bank was sued by Choice Escrow following a cyber assault in which the password and username
(1 comments)
|
hackers: 6 Ways to Protect your Internet of Things from Hackers
- 09/14/14 02:41 AM
Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays (yes, there’s an app for that), tooth brushes (cray cray), and more. A study by HP shows that 70 percent of devices have vulnerabilities. Researchers have revealed that most of the devices in their study, plus the devices’ mobile and cloud applications, had a welcome mat for hackers. Most of these devices had weak passwords (like qwerty) or weakly protected credentials (unencrypted): beacons for hackers. Seventy percent of the devices lacked encryption. Sixty percent had insecure software updates. The
(1 comments)
|
hackers: Are All Hackers Bad?
- 09/08/14 11:11 PM
The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just recently announced they are hiring hackers to find and fix security holes in the Model S car. Google started a league of hackers called “Project Zero” to track down security flaws in their software. Companies like Facebook and others sponsor hack-a-thons, where anyone is invited to try and
(3 comments)
|
hackers: Russian Organized Crime: Krem D'la Krem of Hackers
- 08/08/14 10:27 PM
The Russians have definitely come…in the world of cybercrime. A Russian ring of hackers has amassed 1.2 billion stolen passwords and usernames involving 400,000 websites. The criminals have also garnered 542 million e-mail addresses. And these Russians didn’t discriminate: Any website they could bust into, they did, ranging from big U.S. companies to little websites—anything. Most of these sites remain vulnerable. Apparently, the thieves are not working for Russia’s government (which rarely goes after hackers anyways), nor have they sold the stolen information…yet. They’ve been paid by third-party entities who want to send out spam. This gang of thieves operates
(5 comments)
|
hackers: 10 Ways you may get Hacked this Summer
- 05/13/14 11:13 PM
Can you name 10 ways you can get hacked this summer? I can. Hotel Hacking Those hotel electronic card locks for doors aren’t as secure as you think. A criminal attaches a little electronic gizmo beneath the lock, and presto, he’s in your room. You can’t stop this, but you can make the burglary worthless by not leaving valuables in your room. Always have your door locked overnight. Car Hacking Forget the bent coat hanger trick — that’s for rookies. But even a dimwitted thief could hack into your car this summer. For only $5, the thief buys a “black box,” a
(3 comments)
|
hackers: How To Stop Criminal Hackers In Their Tracks
- 03/31/14 11:20 PM
Do you offer free WiFi? Put these three safeguards in place to protect your customers and your business. On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. “Free” usually translates to "unsecured," which means a criminal hacker with the right hardware and software could have sniffed out my wireless communications and grabbed my data. That same hacker, depending on my device’s firewall, setup and sharing settings, might also have been able to access my drive and files and even plant a virus
(4 comments)
|
hackers: Unsecured Wireless Video Baby Monitors Hackable
- 11/06/13 12:09 PM
Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when cordless phones were 900 MHZ, it was common to hear someone else’s conversations on your own phone or easy enough to eavesdrop on anyone’s call with a store-bought scanner. Today’s baby monitors suffer a similar fate. While it’s all wonderful for a parent who wants to check out their little Johnny from afar, there are security issues with wireless technology if not properly locked down. CBS
(1 comments)
|
hackers: Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
- 10/29/13 11:17 AM
We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why I’m on the search engines constantly). But what most of us don’t realize is that searching for celebrities and other hot topics in the news could put us and our computers, smartphones and tablets at risk. Cybercriminals know that search engines (like Google, Yahoo! and Bing) can also be used for criminal means. They know that if they use breaking news, celebrity gossip,
(2 comments)
|
hackers: Do You Know Who’s Spying on You?
- 09/16/13 02:26 PM
There have multiple revelations about government agencies spying on their citizens, which, frankly, should come as no surprise. But there are also several others who are also spying on you, and often you’ve given them permission to do so. Hackers: Routers can be hacked if not properly secured. Spyware can be installed if your PC doesn’t have antivirus, antispyware, antiphishing and a firewall. Internet service providers: The company that provides you your internet connection collects data about you that is stored on its servers and is available to law enforcement with a warrant or corporations that feel you violated copyright. Employers:
(0 comments)
|
hackers: How Hackers Use Our Information Against Us
- 04/16/13 02:13 PM
We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us? Whether you realize it or not, you expose a lot of your personal information online and even through the technologies you use. From information posted to social networking sites to data sent over unsecured wireless networks, you reveal bits of information that hackers can piece together to either
(1 comments)
|
hackers: Network Hacking – Why Taunting Computer Hackers Isn’t a Good Idea
- 04/23/12 02:04 PM
Would you dare a burglar to break into your home while your family was sleeping? Would you taunt a murderer or serial killer to try and get you? And would you say to a gang of thieves “just try and break into my business”. Maybe if you are a little daring and maybe if you had a screw loose you’d make these irresponsible requests. But in reality “bring it on” is never a good idea. Especially when it comes to your network security. Because “they” just might win. The UFC.com, the official website of the Ultimate Fighting Championship, was hacked by
(2 comments)
|
|
|
|