FBI Warns Against TLS-based Phishing Websites
Here in thethreatreport.com, we always emphasize to our readers to always check the address bar of your browser for the “closed padlock” icon before logging-in to your web service accounts, whatever it maybe. The encryption protocol used is practically speaking still unbreakable even with today’s binary supercomputers. However, the age-old yet pretty effective security advice
[ Read More ]How to Keep Your Business Protected From Cyber Attack
On May 6, 2019, the city of Washington, Pennsylvania, suffered a malware attack that shut down its phone and messaging system for more than a week. The only exception is the 911 system, which operates throughout the county and continues to be available to residents of the city. This type of ransomware attack can occur
[ Read More ]5 Emerging Technologies To Fight Cybercrimes
For many years, we have covered various stories covering topics of malware, phishing, social engineering, cyber espionage and other cybercriminal activities that seem becoming endless. Anti-malware products and services came and went, some underwent mergers and acquisition by another antimalware company, while some announced “a new formula” for combating nasties in the Internet, but to
[ Read More ]Binding Link Between Cyber Warfare and IT Security
Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over their network boundaries. Companies, governments and everyone using
[ Read More ]BEC Scams, A Profitable Phishing Technique
Only a few groups in the cybersecurity industry know or even heard the name “Scattered Canary”, it is considered as a “cyber-gang” with at least a dozen members set to issue targeted BEC (Business Email Compromise) campaigns. Scattered Canary started its operations more than ten years ago, with only a few members, the team targeted
[ Read More ]China, Main Target Of PCastle Crypto-mining Malware
Mainstream Anti-malware vendor, Trend Micro recently revealed the existence of project PCastle, a Monero-based cryptocurrency mining malware launched against China powered by its fileless feature. Once again, the favorite tool of hackers: Windows PowerShell. Other than the developers and system administrators, PowerShell is one of the least features used by a non-technical end-user, but a
[ Read More ]6 Easy Tips On How To Secure Wi-Fi Router
Some wifi routers are misconfigured fresh from the factory or ISP. It works, but not really tuned for security. Today in we provide you with tips on how to secure your wifi router in a non-complicated presentation. There may not be many people who are messing with router settings at the time of purchase, but
[ Read More ]Drone Technology a Rising Threat to Cybersecurity
Drones have become immensely popular all across the world and today drones can be bought and flown by anyone. People use drones for different purposes, ranging from filmmaking and photography to surveillance and agriculture. The trend to use drones for delivering packages and to ship medical samples is also picking up. Well, for any technology,
[ Read More ]Apple Services, Is This The Future Of Cupertino?
At the wake of the Huawei ban, which places the second largest smartphone manufacturer with a questionable future, Apple, the former second largest smartphone manufacturer is set to host its World Wide Developer Conference 2019. Through the WWDC, Apple provides the overall direction of their products and services, their relationship with the development community and
[ Read More ]Why Zombie DDoS Machines Keep Increasing?
The zombie apocalypse theme is a bread-and-butter theme in many sci-fi films and even games. To be overrun by uncontrolled hordes of zombies from all directions, with no place to hide or protect oneself is a very fearful situation. The good thing is that zombies are fiction, isn’t it? Partly incorrect when we talk about
[ Read More ]