Watch out for Cyber Monday Phishing Scams
Who is most likely to fall victim to Cyber Monday phishing scams? People who don’t know about phishing scams, typosquatting, and fake look-alike websites. Did you know there are 4 …
Weekly blog articles covering current, critical cybersecurity topics to help the world become more aware and more secure.
Who is most likely to fall victim to Cyber Monday phishing scams? People who don’t know about phishing scams, typosquatting, and fake look-alike websites. Did you know there are 4 …
Good backups will let you go back in time to recover compromised systems. Don’t let this happen by not patching for BlueKeep now.
CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your computer can be compromised just by visiting a malicious website. That is …
The City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal network and web application were encrypted by hackers seeking a bitcoin ransom. Earlier …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
The FBI issued a stern warning in February 2019. They witnessed multiple Managed Service Providers successfully attacked by advanced hacking tools and organizations. This article details what’s happened since then. …
As part of National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden everyone’s view on the importance of cybersecurity training and awareness. Unfortunately, a lot of small …
The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …
Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …
“Education is learning what you didn’t even know you didn’t know.” – Daniel J. Boorstin We continue to encounter a lack of awareness on the Ransomware topic, and sadly the …
This video explains the common form of phishing simply called phishing. It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …
“It had a devastating effect on our office, Monday, Tuesday, Wednesday, until this morning when they got us up running, we were not able to see half of our patients …
Hack a Charging Cable via Wi-Fi? Most of us have tethered our mobile phones to our laptop dozens to hundreds of times. Have you ever worried about a hacked charging …
Cyber “Events” that Shape History Only a few events in the history of “Cyber” and “Security” cause security professionals sit back, meditate, and try to understand the implications of that event. …
Small to Medium-sized Businesses (SMB’s) are attacked fifteen times more often than smaller firms (>10 employees) and larger firms (<100 employees). In 2018 they accounted for 43% of all security …
Image Source Privacy legislation has expanded significantly in the last two years with the publication and enforcement of the EU’s General Data Privacy Regulation (GDPR). In Jan. 2020, the California …
The latest way hackers are breaching your private information is by using malicious Quick Response codes, more commonly referred to as a QR Code. QR codes were first created back …
CyberHoot received notice today that our Café Press account had been breached along with 23 million other accounts. Fortunately, no password data was reported stolen. However, phone numbers, home addresses, …
On July 29, Capital One announced it experienced a data breach affecting over 100 million customers. While that is an enormous number it represents only 1.4% of nearly 8 billion …
Remember the last time you had to recover access to an account by resetting your password. Maybe it was last month, week, or maybe it was today. Now remember what …
How Phishing Attacks Work An easy example of how phishing attacks work is to take a look at a case that has already happened; a phishing attack utilizing Google Docs …
Overview: On May 14, Microsoft issued a software update patch for its Remote Desktop Protocol (RDP). These patches fixed RDP vulnerabilities in older Windows operating systems including Windows Server 2008, …
Editors Note: This is a reprint of an article I wrote for New Hampshire Business Review in June 2017 outlining the need to make cybersecurity education part of our school …
We’re all familiar with using passwords and some are experienced with password managers, but they aren’t always the best way to secure your critical accounts. If you’re using a password …
Overview In May of 2019, medical testing company, Quest Diagnostics had their second data breach in three years, where 11.9 million customer’s personal information was compromised. The breach likely came …
Hackers are using new tricks to get information or money by blackmailing people through emails. In this latest blackmail scheme, hackers use an individual’s old password, found on the dark …
Cybersecurity skills needed for the 21st century include learning how to use a tool known as a password manager. This skill will provide you huge benefit in security, productivity, and confidence online.
It’s Friday before a long weekend and hackers are up to their old tricks! Hackers just love to hack into our email accounts before a long weekend to give themselves …
This article articulates the steps to immediately take when you’re under attack from this form of attack… something I’ve nicknamed the “Domino Attack”. This attack has distinct phases which the hackers …