Each week we scour the web to discover the latest developments, news and tips that will help you keep your technology (and your business) safe and secure.
Here are the most interesting articles we’ve found this week that could be helpful to you:
An unusual insight into what issues the NSA top hacking and cyber security team takes advantage of. Advanced criminals probably use the same methods to break into organizations like yours.
Rob Joyce, the nation’s hacker-in-chief, took up the ironic task of telling a roomful of computer security professionals and academics how to keep people like him and his elite corps out of their systems.
Cyber criminals like stealing your identity. Here are some scary numbers from the IRS about tax fraud and identity theft. It’s more common than you think.
…nearly 50 percent increase in identity theft complaints in 2015, and that by far the biggest contributor to that spike was tax refund fraud.
Remember – never give out sensitive information on incoming phone calls to anyone. Reputable institutions like the IRS would never ask you to:
The IRS does not initiate contact with taxpayers by email to request personal or financial information. This includes any type of electronic communication, such as text messages and social media channels.
Several major organizations were victims of ransomware this week. Read their horror stories here.
What a week for ransomware. The bullish code that extorts users by locking or encrypting their files and devices has made headlines all week. In case you missed it, here’s a roundup.
In a historic move, Oracle announces plan to deprecate the Java Plugin browser plugin. The attack surface area on most PC’s just shrank by one.
Oracle plans to deprecate the Java browser plugin in JDK 9. This technology will be removed from the Oracle JDK and JRE in a future Java SE release.
A massive security flaw was spotted in iOS recently. The new update fixes the flaw – so download it immediately.
The update fixes a rather serious security flaw, which allowed cybercriminals to potentially monitor, copy and steal the data you use, send and access over a phony Wi-Fi connection. The stolen goods could have included anything you typed while using the device, such as usernames, passwords, and private messages.
If you thought Google Chrome and ChromeOS were free from security issues, think again.
Jerome Segura, a Malwarebytes senior security researcher, said cybercriminals are finding extensions are an excellent way to infiltrate Chrome and ChromeOS because, like apps, most users pay little attention to the permissions that must be agreed to prior to downloading an extension.
There’s a new variant of CryptoWall on the loose – infecting systems and causing mayhem. This article explains how it works.
How It Infects Your System: If users ignore Microsoft’s default security warning, the computer becomes infected when the malicious macro code drops and executes an Upatre variant.
This Upatre variant utilizes a common malware technique called process hollowing or dynamic forking to ultimately infect the computer with CryptoWall.
Want to read some more? Here are some more great security stories from around the web.