Posts

Showing posts from August, 2022

Week 11

 https://blog.teamstack.com/mobile-devices-or-computer-which-is-more-secure/#:~:text=While%20this%20may%20sound%20logical,more%20secure%20than%20personal%20computers. I'll briefly explain the differences between computer security and mobile devices security. When sending confidential data, smartphones are more secure than computers. On a computer, if a file is contaminated, the entire system and all other files are at danger, however on a smartphone, you may establish a number of separate user accounts, and if one is infected, others are not. The article continues to provide examples of how smartphones offer a higher level of security than computers.

Week 10

https://terranovasecurity.com/what-is-identity-theft/ Cyber hackers may steal someone's identity in a number of different ways  such as cyberattacks, malware, phishing, and others. In the US, identity theft is a major problem that affects a lot of individuals becoming more easily fooled via apps and emails o r not protecting their passwords for crucial items. Information from businesses, schools, the government, and hospitals is the target of cybercriminals. They attempt to steal enough information about the company or individual to engage in fraud. If you're interested, there are additional instances of how they may utilize your identity throughout the article.

Week 9

http://plaza.ufl.edu/ysmgator/projects/project2/history.html#:~:text=The%20hackers%20were%20not%20even,hackers%20came%20in%20the%201960s. The majority of people are unaware of hacker's past. When did hacking begin, who was the first hacker? I'll go into insight about the history of hackers in this blog. Hacking began in 1878 when a group of youths disconnected or redirected calls. Actually, these were jokers rather than hackers. However, the first hacker to really penetrate a computer was in 1960. MIT students discovered a shortcut to things because they were curious about technology. Dennis Ritchie and Ken Thompson were the first to people to hack programs in computers and called it UNIX.

Week 8

https://hacked.com/miley-cyrus-rihanna-5-worst-celebrity-hacks/ Hackers are able to exploit a large number of people. They hack their computers, phones, or social media accounts. LeBron James, Rihanna, and many more celebrities were among those who suffered hacker attacks. In these instances, the hacker working for LeBron James demanded payment in order to recover their data. While Rihanna's hacker immediately released information and a photo. H ow did they get their information. Some did this through phishing, while others just hacked into their phones to acquire crucial data. The article contains further information regarding who was hacked and how they did it.

Week 7

https://thehackernews.com/2022/08/a-growing-number-of-malware-attacks.html Dark Utility, a service that offered command-and-control (C2) services, attracted 3,000 customers. Founded in 2022, this service promotes "C2-as-a-Service" (C2aaS). offers for a simple €9.99 access to the TOR network, related payloads, and infrastructure housed on the clearnet, with support for Windows, Linux, and Python-based implementations. Dark Utilities enable hackers to swiftly launch attacks against a range of operating systems, lowering the barrier to entry for them within the threat field. You could learn more about Dark Utility through the article provided at the top. 

Week 6

 https://thehackernews.com/2022/08/three-common-mistakes-that-may-sabotage.html There are several mistakes in security training that individuals are unaware of. There isn't a 100 percent effective solution for some errors, including phishing. However, there are techniques to somewhat safeguard oneself from it. People learn how to avoid blunders like installing harmful applications or inputting codes through security awareness training.  Various alternative techniques consist of: Real-life phishing simulations. Adaptive learning - live response and protection from actual cyberattacks. Personalized training based on factors such as department, tenure, and cyber experience level. Empowering and equipping employees with an always-on cybersecurity mindset. Data-driven campaigns These are some trainings that can assist someone in noticing, grasping, and avoid being deceived once more.

Week 5

https://www.itprotoday.com/vulnerabilities-and-threats/70-percent-breached-passwords-still-use According to SpyCloud's annual Identity Exposure report, 70% of passwords that have previously been compromised are still in use. Frequently, the same password is used. Some of these passwords are weak or widely used. These passwords put customers and businesses at risk of fraud or cyberattacks. Choices that represent shared interests are frequently simpler for hackers to decipher. In order to defend themselves from online risks, many businesses and consumers are adopting greater security precautions and enhancing password security.

Week 4

https://www.itprotoday.com/vulnerabilities-and-threats/fake-windows-updates-trick-users-installing-ransomware  A Windows update is being used to trick users into installing ransomware.  They have no idea that the fake updates are there so that they may learn more about the user. Not all approaches include fake updates; email phishing is another. These tricks are used to deceive not just regular people but also IT specialists. A fake Windows Update screen will be sent  luring the user into downloading ransomware. If you go to the article, it will go into further detail about how it appears exactly and provide additional examples.

Week 3

 https://threatpost.com/war-impact-cyber-insurance/180185/ "There are only two categories of companies: those that have been hacked and those that will be," said FBI Director Robert Mueller.  Cyberattacks are predicted to escalate as the crisis between Russia and Ukraine continues. Many individuals get cyber insurance because they anticipate being attacked rather than due to actual threats. Initially, parts of the insurance sector fell into that trap. But some industries are returning to traditional risk measurement. According to GAO, the cost of coverage for more than half of those who have cyber insurance policies will have increased by as much as 30% by the end of 2020.

Week 2

https://threatpost.com/encrypted-fileless-malware-growth/175306/ According to WatchGuard Technologies, there are two distinct families of malware. In the first quarter, AMSI Disable.A, the first one, was found. The more older malware was identified as XML. JSLoader. Analysts estimate that in the second quarter, 91.5 percent of malware was sent using HTTPS-encrypted connections, making assaults harder to detect. The malware family AMSI Disable A uses PowerShell tools to attack vulnerable Windows systems. Antimalware Scan Interface, or AMSI, features a code that may disable itself. In 2021, malware detections coming from scripting engines like PowerShell had already surpassed 80% of the amount of script-initiated attacks from the previous year.

Week 1

 https://home.cern/news/news/computing/computer-security-banks-and-work Cern, an European company known for their nuclear research, has been fighting their own battle with hackers and ways that people can access their information. It would be very deadly if they did because of all the damage the hackers can cause. They bring up the idea of 2FA, which is two factor authentication. I wanted to share this with you on useful it has been for many companies and the way it can be used for other things to deter hackers.