Archives: 'Security Threats'

Doug Bedell — August 5, 2020, 1:04 pm

‘Grand Crab’ Ransomware an Example of Computer Extortion

Watch out for guys like this. Paul Ducklin on the Naked Security blog reports on the arrest of a 31-year-old man “who is alleged to have extorted more than 1000 victims with the infamous Grand Crab ransomware in 2017 and 2018. “He apparently demanded payments ranging from $400 to $1500 in Bitcoin. “Unlike more targeted […]

Doug Bedell — August 3, 2020, 10:19 am

Hacking Twitter Could Pose a Security Threat to Us All

Bruce Schneier advises that the recent hacking disruption of Twitter, the social network, is a warning of what could happen if the entire Twitter network is disrupted by computer attackers. “Imagine a government using this sort of attack against another government,” Schneier suggests, “coordinating a series of fake tweets from hundreds of politicians and other […]

Doug Bedell — July 31, 2020, 11:50 am

Online Safety a Big Concern in Remote Learning

To the extent that remote learning will be practiced in the new school year, educators, parents and students have to do some quick learning about cybersecurity, The Last Watchdog blog advises. “Overnight, those in charge must learn how to operate all of our elementary, junior high and high schools as if they were digital-native startups,” […]

Doug Bedell — July 29, 2020, 11:36 am

Continual Alertness Required for Computer Security

The KnowBe4 security awareness training blog, in a post by Roger Grimes, advises that “Seventy to ninety percent of all malicious breaches are due to social engineering and phishing!” Those are deceptive e-mail or text messages for gaining private information for sinister purposes. Unpatched software is another source of digital risk. “Iā€™m asking you,” Grimes […]

Doug Bedell — July 27, 2020, 11:21 am

Preparing For a Career in Cybersecurity

Krebs on Security discusses what it takes to have a cybersecurity career. It’s challenging but, like most desirable skills, attainable with study and experience. “Granted, most people who have just graduated with a degree lack practical experience. But happily, a somewhat unique aspect of cybersecurity is that one can gain a fair degree of mastery […]

Doug Bedell — July 24, 2020, 12:50 pm

A Security Rub: We’re All Masked Now

It’s not so easy during the COVID-19 pandemic to identify people by full facial recognition – practically everybody is wearing masks. The Security Industry Association discusses what that means in a blog post.”Skeptics say that the adjustments will not be simple.” “While companies are adjusting their facial recognition systems in response to virus countermeasures, they […]

Doug Bedell — July 22, 2020, 12:07 pm

Genealogy, Too, Can Be a Pursuit With Web Security Risks

You never know where computer security can run afoul. Consider and Family Tree Maker genealogy software. The ThreatPost blog reports that “A server containing information of users of a genealogy service has exposed the data of 60,000 users, putting them at risk for fraud, phishing and other cybercriminal activity. “Research led by Avishai Efrat […]

Doug Bedell — July 20, 2020, 11:33 am

Twitter’s Account of a Cyber Attack on Its Employees

The big guys ā€“ like Twitter ā€“ get hit with cyber attacks too. Here, on, is an account from Twitter – “An update on our security incident” – on one such incident that occurred on July 15. “At this time,” Twitter advises, “we believe attackers targeted certain Twitter employees through a social engineering scheme. […]

Doug Bedell — July 17, 2020, 10:02 am

U.S. Army Helps Fight the Coronavirus Pandemic

The U.S. Army has been going to war to respond to the coronavirus crisis, reports. “Soldiers have built hospitals, supported hospital staff, helped deliver food and managed nursing homes since the president declared a national emergency in March as COVID-19 cases began sweeping across the country, now killing more than 137,000 Americans… “The Army […]

Doug Bedell — July 15, 2020, 11:12 am

For Computer Security, Read About RATS and Zombies

Read up on how computers can become infected by stealthy intruders, in this instance RATS, or remote access Trojans, courtesy of Paul Ducklin on the Naked Security blog. Zombie is another name for RAT. “Indeed, the name RAT was originally coined as a metaphor that referred as much to the criminals that deployed the malware […]