Heavily funded, mass scale hacking operations might look impressive and expensive, but they’re not nearly as sophisticated as they’d have us believe. Recently, IBM released a study that announced most hackers use pretty common techniques to gain access to organizations and to steal their data.
Web browsers are a gate open to the internet. Although we may not realize it, we rely extensively on the use of web browsers to read emails or local news, to check the weather forecast or to manage our financial resources.
Weak browser security can very often lead to performance issues, malware infections or worse, to cybercriminals stealing your data and gaining control of your system.
Malware can sit dormant on your smartphone for some time before it is activated and before you become aware of it. Researchers have found that the triggers may be as simple as music and light. Just by pulling out your phone and interacting with it in a cinema could trigger the malware into activation mode, via built-in sensors such as the microphone, camera, vibration sensor or magnetic field monitors. In other words, it’s not just your emails and internet access that makes your mobile susceptible to malware attacks.
If you’ve got children, they want to be on Facebook. And for most of those children, online social networking is a reflection of their offline lives; however, for some, just as in their offline lives they sometimes can struggle to resolve their problems or conflicts. This struggle can manifest itself in negative ways online, amplifying and perpetuating the issues; and this is when harassment, cyberbullying and exposure to inappropriate content can happen.
They’re in cahoots! Reveton malware developers have added keylogging to their ransom demands. This new addition acts as a backup tactic in situations when victims refuse to pay up when held at ransom. Microsoft discovered this tactic in late-May and reportedly, this new method is distributed using the Blackhole Exploit Kit.