In late May of this year, a new cyberattack technique was discovered that delivered malware via the mouse hover feature in PowerPoint files. This technique debuted in a spam campaign that targeted the United Kingdom, Poland, Sweden, and Netherlands.
Cloudflare, a major CDN service, has accidentally leaked customers’ sensitive information for the past few months. On February 17th, Tavis Ormandy, from Google’s Project Zero, notified the CloudFlare security team of leaked data that he came across while working on a corpus distillation project. According to Ormandy, “This information included private messages from major dating sites, full messages from a well-known chat service, online password manager data, and hotel bookings. We’re talking full https requests, client IP addresses, full responses, cookies, passwords, keys, data, everything.”
Not all publicity is good publicity, especially when it comes to a cyberattack. A cyberattack can hurt your business’ data, reputation, and cost you future sales. Within the first month of 2017 there have already been a multitude of cyberattacks. These victims include businesses just like yours, with headlines reading Lloyds Customers Hit by Cyberattack, Austrian Hotel Forced to Pay Ransom Following Cyberattack, and Cyberattack Shuts Down Sundance Box Offices. These breaches can happen at anytime, and to anyone. The next big data breach is not an if, it’s a when.
Every year millions of people fall victim to phone scams. In a recent study on 2015, approximately 11% of the adult population in the United States (27 million) fell victim to a phone scam. The total losses amounted to roughly $7.4 billion. Each year the number of victims continue to increase. Whether it’s the IRS calling about money owed or a relative has been kidnapped and the caller is requesting ransom, there are a few things to remember when it comes to these unsolicited calls.
If you use email, it’s likely you have come across a scam attempting to trick you into giving them important personal information such as your social security number, passwords, or credit card numbers. These emails at a glance will seem trustworthy and sent from what looks like a website you frequently visit or a mailing list you’re subscribed to. When you’re quickly skimming through emails, it is easy to miss the small tell-tale signs of this trap, known as a phishing scam. Although these hackers are crafty, there are several things to look for to make sure you don’t take the bait.
Welcome to 2017 and the next installment in our series on tech predictions for the year. You may have heard about the recent Consumer Electronics Show in Las Vegas. The CES is one of the largest events showcasing the latest gadgets and advancements that will soon become available to the public. It’s become the first glance at the latest in Internet of Things. IoT is better known as all of the smart devices that are making your environment more connected to your phone or tablet. These items are growing in popularity, and items such as the Google Home Voice Command Device have even made the news. IoT are fun and advanced items, but are they for you?
It’s time to reflect on this past year and resolve to make the next one better. There has been an escalation of hacks in 2016 and it’s not going end any time soon. In fact, cybersecurity threats are becoming more strategic at targeting businesses’ vulnerabilities. As technological developments continue to rapidly advance and the world becomes even more dependent on their devices, we forecast a significate increase of attacks in 2017. Predicting cybersecurity threats for 2017 involves tracking and analyzing this past year’s major attacks as well as anticipating new and evolving threats. New Year’s resolutions are often broken by mid-February but ones that businesses can’t afford to break are those involving cybersecurity. With 2016 quickly ending, we’ve broke down the top cybersecurity threats you need to prepare for in 2017.