Showing 12 results for:

malware

All results

12
The Malware Hackers Used To Target Baltimore Was Created By The NSA

Over the past month, Baltimore has faced repeated cyber attacks that have shut down the city’s email and systems allowing residents to pay water bills, purchase homes, and more . Now, a report by The New York Times has revealed that the malware used to attack Baltimore was created by the National Security Agency (N.S.A.). Security experts told the New York Times that attackers were using a tool called EternalBlue. Essentially, EternalBlue works by targeting a vulnerability in some versions of Microsoft’s Windows XP and Vista systems, The Verge reported . This lets external parties use remote commands on their targets. In 2017, the N.S.A. lost control of EternalBlue after it was leaked by a hacking group called ShadowBrokers . The tool has been used around the world, including in attacks against Ukrainian banks and infrastructure in June 2017. Baltimore was originally attacked on May 7. City workers found that their screens were suddenly locked. The hackers demanded almost $100,000...

May 28, 2019

Claudette McGowan Raises $7.2M For AI-Powered Cybersecurity Firm, The Largest Amount Raised By A Sole Black Woman Founder In Canada

Claudette McGowan has raised significant funding to address cybersecurity concerns. Protexxa McGowan founded Protexxa, a Canada-based cybersecurity firm launched in 2021. It uses artificial intelligence (AI) to help companies and individuals resolve cyber issues or attacks faster. Examples of this include detecting exposed passwords, taking down online images, and developing response plans for customers in the event of an attack, a press release mentioned. With human error accounting for 90% of cyber attacks, the company’s solutions focus on improving personal cybersecurity hygiene to reduce business risk, per the press release. “People aren’t prepared for the reality of this risk, plus AI is helping attackers to scale, every device is connected, and there’s a shortage in cybersecurity talent to help reduce these risks,” McGowan told TechCrunch. “Using simple passwords, not using MFA [multi-factor authentication], ignoring privacy settings or over-sharing are all ways humans play a...

Jul 23, 2024

New to Coding? Here's How To Become A Software Engineer From Scratch

Ever dreamt of building the next game-changing app or crafting the software that powers our world? There are endless possibilities. But what if you have no prior experience? Can you learn how to become a software engineer from scratch? Jobs in software, data, and technology have grown within the past 20 years. The need for programmers and other IT workers has grown dramatically as technology has permeated every industry. An increasing number of individuals are drawn to software employment due to its profitable nature , which provides an adaptable work environment and a highly competitive salary. You might be curious about the precise duties of a software engineer. You probably use mobile and web apps and visit different websites every day. Thousands, or perhaps hundreds, of lines of coding go into making these contemporary technologies. A software engineer wrote those lines of code. So, how can you become a software engineer from scratch? As the United States Labor Bureau projects...

Apr 5, 2024

Meet Marcus Hutchins: the Black Hacker Who Saved the Internet and Got Arrested by the FBI

At just 22-years-old, this hacker became an accidental digital security hero that saved the world from the worst cyberattack it has ever seen. Marcus Hutchins, a British computer security researcher, discovered the WannaCry ransomware attack in 2017 and used a “kill switch” to stop the escalating attack, which at the time was spreading around the globe, according to The Verge . The U.K. media revealed him to be the person responsible for halting the ransomware contagion, but soon after his reputation as a hero was tainted by accusations of Hutchins making and selling the Kronos banking malware, Tech Crunch reports . He was later arrested by the FBI, according to Wired , as a result of his teenage work on a code that was later used in banking trojan software. So much time had passed since the news broke of his astronomical effort that when Hutchins was approached by the authorities he assumed that they wanted to know more about his work on WannaCry. During his interrogation, Hutchins...

May 14, 2020

Microsoft Takes Proactive Measures to Fight Cyber Attackers and Protect Customers

Microsoft is seeking to reinforce its cybersecurity, following a recent legal victory against overseas hackers. According to CNBC, the court ruling allowed Microsoft to appropriate 50 domains that hackers used to infiltrate user accounts. “Thallium,” a group of hackers reportedly based in North Korea, used malware to collect and misuse the personal information of thousands of users in America, Japan, and South Korea. The latest pernicious attacks compromised systems and enabled emails, calendar entries, and other password-protected information to remain available to hackers even after users had changed their passwords . Thallium hackers gained access to Microsoft accounts through phishing techniques, in which users are prompted to click on links that appear to be from genuine sources. The fallout from such hacks is substantial, as the malware embedded in the links creates infinite system vulnerabilities. Thallium is not the only group of its kind. Other groups, such as the...

Jan 2, 2020

Not Covering Your Webcam May Lead to Hackers Uncovering Your Privacy

In 2016, when FBI Director James Comey conducted a question-and-answer session on privacy at Kenyon College , one of his revelations baffled the audience. Comey admitted to covering his laptop’s webcam to ensure privacy, and encouraged others to do the same. Some thought it ironic, coming from a federal agent whose work involved the very infiltration of privacy. In the three years since Comey’s initial warning, the information security landscape has changed dramatically. Not only did a presidential election make Americans think twice about online security threats and the ramifications of hacking in politics, but major breaches at well-respected companies such as Target, Equifax, and Facebook also revealed the impact on our wallets and on our identity. While many can imagine what hackers could want with your personal and account information, it may be harder to discern how your webcam video feeds and sound bites could prove valuable. Hackers can actually use a Remote Access Tool to...

Dec 30, 2019

Here's Why Cyber Security Should No Longer Be 'Optional' When It Comes To Running Your Business

Many business functions, no matter the industry, use the Internet to send packets of communication which adjust inventory levels, charge credit cards, manage personnel profiles and much more. Since we’re in an ultra-connected society and there’s no going back, there are always online threats that we should be aware of including viruses, malware, trojan horses, ransomware, Social Engineering, man in the middle attacks, phishing and more. According to Verizon’s 2019 Data Breach Investigation Report , 43 percent of breaches targeted the data or processes of small businesses. Even though the threat of cyber attacks is high than its ever been, cyber security remains an afterthought for too many entrepreneurs and business owners — something they’re only focused on after the damage is done. Here are a few steps any diligent business owner who wants to ensure their operations run effectively and safely should take to protect their business data and maintain client and customer trust: 1....

Sep 20, 2019

Google Now Lets You Register .dev Domains

Google Registry is now giving people the power to register .dev domains in an effort to expand access to website names that would otherwise be taken or too expensive to buy. The new top-level domains are dedicated to developers and technology companies. Some communities that are already using the domain include Women Who Code at women.dev and Slack at slack.dev. Google Registry also recently launched  .app and .page domains. Each of the domains, including .dev, require HTTPS, making them secure for users. “This protects people who visit your site against ad malware and tracking injection by internet service providers, and from spying when using open WiFi networks,” Google’s Vice President and Chief Information Officer Ben Fried said in a blog post . “With every .dev website that’s launched, you help move the web to an HTTPS-everywhere future.” The company is offering an Early Access Program to register for a .dev domain now through February 28.

Feb 21, 2019

7 Online Frauds That Can Result In Someone Stealing Your Bag

The Internet is full of fraud. It is easier to scam people online than to do it on the street. At the same time, many online scams are well known and easy to avoid. Fraudsters know this and use different social engineering tricks to look like legitimate businesses. Most scammers operate from countries where there is almost no control. They act in the gray area of the digital world and use popular security tools that make them anonymous, invisible and inaccessible to regulators, law enforcement agencies and victims. Scammers work just like ordinary businesses. They have offices, secretaries, shifts, payrolls and even holidays. How do I avoid online fraud and scams? This is usually easy since many of them are pretty clear. In most cases, you just need to train yourself to understand the difference between fake and real websites. Below are seven of the most common online frauds, as well as tips on how to stay safe. 1. Binary options Binary options is a simple way to trade financial...

Nov 28, 2018

6 Ways To Help Your Company Prevent Phishing Attacks

The following tips will help your company avoid phishing attacks and mitigate the risk if the breach gets through. Companies are juicy targets for threat actors from the dark web because their proprietary data is a commodity that can be traded and leveraged for industrial espionage, blackmail, unfair competition or outright theft of funds. To their credit, lots of organizations use high-end defenses to thwart unauthorized access nowadays, including sophisticated IDS and IPS (Intrusion Detection/Prevention Systems) that stop the classic hacker incursions in their tracks. Under the circumstances, cybercrooks are increasingly focusing on social engineering techniques to pull off their breaches. They know human factor is one of the most vulnerable segments in an organization’s security posture, and the overall protection of enterprise assets is only as strong as its weakest link. Whereas there are numerous different flavors of social engineering, phishing is by far the most common one....

Sep 25, 2018

Is Spyware On Your Computer? Here’s How You Check

If you’re an avid user of the internet, spyware is something you should be concerned about. A lot of users ignore online spying, with the belief that it has no effect on them. However, if you have ever typed out your financial or login details with your computer keyboard, read your mail, or do anything with your computer you would consider private, chances are you were being watched. Spyware could be installed on your computer for a lot of reasons; to monitor your emails, call logs and messages, to steal your credit card or login details, or even to view your browser history. Apart from compromising your privacy, spyware slows down your computer, making it difficult to function optimally. There are lots of ways Spyware could get into your computer. Most people would not consciously install spyware on their device, so hackers design them in the form of Trojans. When you install programs that are not trustworthy or visit malicious links and websites, spyware can make its way into your...

Sep 24, 2018

6 Ways To Help Your Company Prevent Phishing Attacks

Companies are juicy targets for threat actors from the dark web because their proprietary data is a commodity that can be traded and leveraged for industrial espionage, blackmail, unfair competition or outright theft of funds. To their credit, lots of organizations use high-end defenses to thwart unauthorized access nowadays, including sophisticated IDS and IPS (Intrusion Detection/Prevention Systems) that stop the classic hacker incursions in their tracks. Under the circumstances, cybercrooks are increasingly focusing on social engineering techniques to pull off their breaches. They know human factor is one of the most vulnerable segments in an organization’s security posture, and the overall protection of enterprise assets is only as strong as its weakest link. Whereas there are numerous different flavors of social engineering, phishing is by far the most common one. It denotes a tactic where hackers send rogue emails to a company’s employees, requesting sensitive corporate...

Sep 18, 2018