After analyzing over 72,000 phishing URLs they have collected, researchers found that out of the 195 compromised government-administered servers, sites belong to the Brazilian and Chinese governments were the most successfully targeted. This suggests that countries with fast-growing economies are having trouble keeping up their cyber-protection as they grow. For a full story on this, click here:: Brazilian, Chinese govt sites host the most phishing pages
[sc:mbta]
Identity Guard
Identity Guard has consistently remained one of the top identity theft protection companies as they are much more than a credit monitoring service.
Why We Should Treat Cyberattacks Like the Flu
When your body is attacked with an illness, there are several things happening all at once. Your body’s temperature rises in order for body heat to help kill the disease. Your stomach, nose, and other parts of the body purge out the infection. Pain alerts the brain what needs to protected and addressed. There are not only several alarms present, but also several measures the body takes in order to protect and prevent a disease from getting further but also to expel it outright.
Cyberattacks and compromise happen to any computer system as often as the human is exposed to dangerous germs and diseases. So why not adopt a security program like an immune system rather than just making a barrier after the fact? As soon as a new virus has been created, steps are taken to make a barrier but it is always after the fact. The time it takes to create a barrier leaves the exposed network open for attack for too long. Steps of internal communication need to be taken so that computer systems and networks detect new suspect services and downloads more often to block viruses at the source before they move forward.
Read the full article about this here:: Enterprise Security: Why You Need a Digital Immune System
[sc:mbtc]
The Key to Unlock Your Google Account… Literally
While Google has already has a two-step authorization in place that involves your text messaging service, it has recently debuted another method to unlock you account: a USB key. This way you can regain access to your Google account in case your phone is out of commission or you wish to avoid certain charges on your phone bill. Read a full article on this new method here: Google now lets you prove your identity with a USB security key
[sc:mbta]
Is Facebook’s Safety Check Creepy but Wonderful or Just Creepy?
Facebook has added a feature to its website that will allow your friends to know whether or not you’re okay when disaster strikes. Dubbed “Safety Check,†whenever Facebook catches wind about an earthquake, hurricane, or other crisis at your listed location and allows you to send an update to your friends that you are safe. Sounds like a great service, right?
Well, yes and no. As time has gone and evidence has shown that social media is becoming a more often used beacon and barometer of what’s happening in the world, it is handy to have such a notification on hand. It is much easier to send one message of “I’m fine†to ease the worries of all those you love than it is to call or text everyone individually. It’s also helpful for your loved ones to see your notification on their feed rather than attempt to call and fear the worst.
However, because this Safety Check identifies your location and can correct it if your location is incorrect, it leads to yet another hassle regarding your privacy. Again, you’ll have to review and change your settings as to who can see what. For more details and info to see if this notification is for you, click here.
A Major Flaw in UPnP Leaves Us All Vulnerable
Many of us use Universal Plug-N-Play (UPnP) devices in our home and office to do our work, shop, and other uses for the internet. However, be forewarned. Due to the Simple Service Discovery Protocol (SSDP), which is standard on UPnP devices, hackers can abuse and target you and your information. This comes off the heels of Distributed Denial-of-Service (DDoS) attacks from earlier this summer.
There has to be a way for manufacturers to properly protect our information. Because of this method, over 4.1 million devices are at risk of being attacked. Hopefully this latest flaw can be repaired and we can consistently stay one step ahead of hackers. For more information, read more here.