Identity Theft and Happy Holidays!

In this article, I am focusing on two very important aspects of cyberspace, your Identity and online shopping through a great resource called CISA. CISA stands for -The Cybersecurity and Infrastructure Security Agency. (Homeland Security - https://www.dhs.gov/CISA ) Identity Theft: It is considered one of the most widely committed crimes and with advent of the internet and increasing use of num...
Read More

Meltdown & Spectre – Hackers can exploit the Hardware design Flaw in Intel, ARM and AMD Chips

Meltdown and Spectre sound like the bad characters from the new animated feature film but there is nothing comical about them. These flaws, called Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from smartphones, PCs and the cloud computing services that many businesses rely on. -NYTimes Intel put out a notice to all its partners who make operating s...
Read More

Your Home Wifi – You are now Krack ‘ed open – WPA2 Security Privacy Risk – Update your Wi-Fi router firmware!

Almost everyone who has access to the internet uses a Wi-Fi enabled device connected to a Wi-Fi router or access point and if your Wi-Fi router firmware is not upto date or your are using the WPA2 security protocol then you may be at risk of attackers accessing your sensitive information. Most consumer devices supplied by Internet Service Providers come with pre configured security (WPA or WPA2...
Read More

Identity monitoring : Fraud Alerts on your Credit / Debit cards / Drivers Licence & Other IDs- Free & Effective

Have you been looking for worry free identity monitoring which not only monitors your credit cards but also monitors your debit cards, drivers licence, passport and more? And of course not pay a dime? Before you choose your ID protection, make sure you understand how these work. Credit /Debit Card transactions, all have to go through a standard entity which checks for validity of the cards. If ...
Read More

Equifax Announces Massive Breach September 7th 2017. What you need to know and do, Read more.

On September 7, 2017, Equifax first reported a massive breach of customer information. We recently discovered a cybersecurity incident involving consumer information. Once discovered, we acted immediately to stop the intrusion. — Equifax Inc. (@Equifax) September 7, 2017 What do we know about this massive breach as of September 8th morning? Equifax estimates about 143 million cus...
Read More

Petya – What you need to know now.

Petya is a ransomware in the form of worm that hit computers worldwide locking down computer systems and demanding $300 in bitcoins. Ukraine government's computers were brought down during the initial spread of this ransomware through a software update mechanism built into an accounting program that companies working with the Ukrainian government need to use called m.e.doc. Read the full technical...
Read More

Ransomware

Ransomware is a type of malicious software that blocks access to the victim's data or threatens to publish or delete it until a ransom is paid.   Read Full Wikipedia article here
Read More

SC Security July 2016 Bulletin-1

All sorts of news are making the headlines. Brexit, US Presidential elections, Olympics and gun fire, to name a few. All of these social events have widespread effects in the digital media especially in internet security. Here are some of the highlights for the month of July. Phishing scam targets Brexit situation. 80,000 Login Credentials Leaked as Amazon Ignored Warnings From the Hacker....
Read More

5 Signs That You May Have Received A Phishing Email

Ever wondered why you get so many junk emails? Nowadays it's more than just junk, they are deliberate attacks and the word is 'Phishing'. We all are vulnerable and that is why we get them. Here are 5 Signs to look out for when these low life scums send us an email: Spoofed, Random and Arbitrary Email Addresses. Phony "From" address  Look at the 'From' address. If this is an email addres...
Read More

Understanding the Threat – Breaches

A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. Incidents range from concerted attack by black hats with the backing of organized crime or national governments to careless disposal of used computer equipment or data storage media....
Read More
Make sure you receive Important News & Alerts on Cyber Security and Giveaways. Click here for more Information. 
Holler Box