Security News > 2020
Just as law-abiding people have been discussing COVID-19, so too have criminals on the dark web. In a report published last week, Sixgill discussed the specific topics that the coronavirus has been generating on the dark web.
Security should always be a top priority, but it's easy to let these security reviews and user training fall low on the to-do list. No one wants a reminder about how important these tasks are in the form of an expensive security breach.
Tom Merritt lists five remote access threats so you can secure your system. Here are the five remote access threats you should know about.
Sophisticated state-supported actors are following cybercriminals in exploiting the coronavirous pandemic and posing an "Advanced persistent threat", French defence technology giant Thales warned Monday. Hades, linked to the APT28 which is believed to be of Russian origin and behind an attack on the US Democrat party in 2016, was the first state-backed group to use the epidemic as bait, Thales' cyber intelligence service reported.
When working from home, it's important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system.
While the affected service may reset passwords to prevent abuse, it's not uncommon for users to set the same password for other websites as well, leaving them exposed to credential stuffing attacks. Microsoft says the Password Monitor feature in Edge will notify users if the password they are entering using autofill has been offered for sale on dark web sites.
The Zeus Sphinx banking trojan is back after being off the scene for nearly three years. First seen in August 2015, Sphinx is a modular malware based on the leaked source code of the infamous Zeus banking trojan, the researchers explained.
In protest of that story, forum members donated hundreds of thousands of euros to nonprofits that combat cancer. This week, the forum is celebrating its third annual observance of that protest to "Fight Krebs," albeit with a Coronavirus twist.
How to set up an Android phone as your security key for your Google account. Set up two-step verification for your Google account through your phone or a computer by signing into the webpage for your Google account.
Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services.