Latest phishing publications
As more workers rush to adopt remote working technologies such as cloud-based teleconferencing or collaboration tools, cyber security companies have been quick to identify the ways in which hackers might exploit the situation to compromise users.
The latest company to do so is Check Point Software, whose researchers have penned a fresh blog post detailing how cyber hackers are taking advantage of surging demand for Zoom, conferencing software that has become a household name in recent weeks.
Security experts have warned that criminals are using people’s fears over the coronavirus crisis to target victims online. The National Cyber Security Centre (NCSC) said “opportunistic” cyber criminals are using the deadly outbreak to launch online attacks. Clicking on to the links on bogus emails which say they have important updates has led to devices being infected.
Cybercriminals are becoming increasingly sophisticated. And whilst we might associate hacking and other forms of cybercrime with attacks on computer systems and individual machines, there is a dangerous growing trend that sees mobile devices becoming a prime target. It seems that phishing – the practice of sending deceptive messages in order to trick the receiver into downloading malware or revealing their password – is being increasingly targeted towards mobiles.
System maintenance for cyber security can be a tough cookie, especially considering the amount of training and experience it takes to pull off the job efficiently. Once you’re already in the IT scene, it’s also important engineers are up to speed with the various improvements and trends in the area. This means being not only aware of best practices, but the types of risks that are out there. Here are some glaring cyber security holes you shouldn’t miss in your maintenance:
A U.S. district court has provided Microsoft with a court order allowing the company to seize control of 50 domains operated by Thallium, a cybercrime ring believed to be of North Korean origin. By taking control of the domains, Microsoft will be able to suspend ‘spear phishing’ activities conducted on these websites.
Microsoft investigators have been tracking Thallium’s criminal activities, as they used their online network to target victims and compromise online accounts, infect computers with malicious code, and steal sensitive data.