Hacker Tracker | May In Review
Monthly Cybersecurity Update
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware–without being afraid–of the cybersecurity threats that are real threats to your business. PK Tech aims to be a leading educator and support tool in the world of cybersecurity.
Check out our monthly “Hacker Tracker” for the latest cybersecurity hacks, breaches, and updates…
#1- If you installed any of the apps mentioned above before their removal from the Play Store, you will still need to uninstall them from your device manually and run an AV scan to clean any remnants. Mobile cybersecurity attacks are on the rise–from malware to text message phishing attempts; understand that the same precautions you take for computers must now be taken for mobile devices.
#2- From the Google Chrome extension breaches, we learn the danger of this form of attack. Because this strategy takes advantage of the target’s already-logged-in session to steal emails, it’s nearly impossible for the victim’s email provider to detect the breach. The best form of protection is to ensure you are up to date on all security updates for extensions such as Google Chrome and any other software you are running on your computer.
#3- While all ransomware attacks, to some degree, are based on fear, this latest countdown attack depends on putting the fear tactic directly to the individual victim versus the organization at large. Using the time-affected panic tactic is an interesting play on human nature. Even though the warning isn’t real and if the countdown timer reaches zero, nothing will be deleted–the notion of fear causes victims to panic and comply. Remember: in nearly all cases, there is always time to call your IT guy or managed IT company to find out how to proceed.
Countdown method or not, phishing attacks are one of the most common methods cybercriminals use to steal usernames and passwords. Utilize multi-factor authentication to help protect accounts. This way, even if a cybercriminal gets your username or password, they won’t be able to gain entry to your account if MFA is employed.
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard.” Our goal at PK...