Tag Archive for: 100K

Internet security certifications that can net a $100K+ salary


In the dynamic realm of cybersecurity, possessing pertinent certifications can be the key to unlocking lucrative career paths. Securing a six-figure salary in the internet security sector is not merely an aspiration; it is an attainable goal with strategic certification choices. This article delves into the certifications that can propel you towards a $100K or higher income and elucidates why these credentials are held in high esteem within the industry.

In the ever-changing landscape of digital threats and defenses, cybersecurity professionals armed with the right certifications are in high demand. These certifications act as a testament to your expertise and proficiency in safeguarding digital landscapes, making you a valuable asset to organizations. Choosing the right certifications is akin to strategically positioning yourself in the job market, ensuring that your skills align with the industry’s evolving needs.

By examining the certifications highly prized in the field, this article aims to guide aspiring cybersecurity professionals toward making informed choices that can significantly impact their earning potential. As the cybersecurity arena continues to evolve, staying abreast of the most sought-after certifications is not just a career strategy; it’s a financial investment in one’s professional future.

Certification #1: Certified Information Systems Security Professional (CISSP)

Begin your journey towards a high-paying security position with the CISSP certification. Acknowledged globally, CISSP demonstrates your expertise in designing, implementing and managing a robust cybersecurity program. Its broad coverage includes security and risk management, asset security and communication and network security. CISSP is often a prerequisite for leadership roles, making it an excellent investment for those aiming for top-tier positions.

Ensure your resume stands out by prominently featuring the CISSP certification. Employers often prioritize candidates with this certification due to its comprehensive coverage and rigorous examination process.

Certification #2: Certified Ethical Hacker (CEH)

Organizations are increasingly recognizing the importance of ethical hacking to…

Source…

At least 2 Android users lose nearly $100k of CPF savings in June in malware-related scams


SINGAPORE – At least two Android users lost $99,800 of their Central Provident Fund (CPF) savings in June to scams involving malware.

The police said on Saturday that the victims came across advertisements marketing groceries like seafood on social media platforms, including Facebook.

The victims contacted the businesses through their social media platforms or WhatsApp.

They were sent a URL to download an Android Package Kit (APK) file, an application created for Android’s operating system, to order groceries and make payment. 

APKs are installation files for Android apps that can be downloaded from the Internet and third-party app stores, instead of the Google Play Store.

Apps or APK files from the Internet or a third party could contain phishing malware.

The victims were unaware that the application contained malware that would allow scammers to access the victims’ devices remotely and steal passwords. These included Singpass passcodes, among other details stored in the victims’ devices.

“The scammer might also call the victims to ask for their Singpass passcode, purportedly to create an account on the application,” said the police.

Victims were directed to fake bank sites to key in their login credentials to make payment within the app.

The malware would capture the credentials entered.

The scammers were then able to access the victims’ CPF accounts remotely using the stolen Singpass passcode and make a request to withdraw funds through PayNow.

The police did not state the victims’ ages. CPF members can withdraw some of their savings when they turn 55 and receive monthly payouts under the CPF Life scheme when they reach the eligible age, which is currently 65.

Once the CPF funds were deposited into the victims’ bank accounts, the scammer accessed the victims’ bank applications and transferred the money out via PayNow.

The victims realised they had been scammed when they discovered unauthorised transactions on their bank accounts.

Source…

Sydney man jailed over $100k SMS phishing scam


Sydney man jailed over $100k SMS phishing scam

Sydney Local Court has sentenced a 40-year-old Sydney man to a two-year, eight-month stint in prison over an SMS phishing scam that began in 2018.

The man had created a number of fake websites for the National Australia Bank, the Commonwealth Bank of Australia, and Telstra. He then contacted customers via SMS and tricked them into supplying personal information, which he in turn used to access their own bank and telephone accounts, and to create new accounts in their name.

The NSW Police Cybercrime Squad, working with the AFP, arrested the man on 24 November 2021 after working with the banks and Telstra to identify his victims. Also found on the premises were SIM cards, mobile phones, drug paraphernalia, bank cards, and a range of other electronic devices, all of which were seized by police.

The AFP reports that the man had scammed over $100,000 out of 39 victims, while the companies affected were able to place tighter security on other affected account holders, protecting a further 16,147 account holders.

Last Friday, the man was found guilty of four separate offences regarding obtaining benefit by deception, unauthorised access with intent, and obtaining data with intent. The perpetrator will also be subject to a 13-month good behaviour bond and a $1,000 recognisance bond on release.

“The AFP is committed to tracking down cyber criminals and bringing them to justice, no matter where they are in the world,” said AFP spokesperson Commander Chris Goldsmid.

“Scammers will use any tools they can to exploit people for their own profit. The internet and other new technologies provide opportunities to remotely access potential victims.”

Despite law enforcement’s constant urging that victims are far less likely to recover lost funds if they remain silent, a report released by internet security company Avast in 2022 suggests that almost half of the 37 per cent of Australians impacted by phishing fail to report it.

ISCOVER

“Reporting phishing scams that you encounter is critical to ensure we keep our digital world as safe as possible,” Stephen Kho, a cyber security specialist for Avast, said in the report

“Even…

Source…

Judge Says Insurer Must Cover More Than $100K in Ransomware Payment – USA Herald


This is the case of Yoshida Foods International LLC v. Federal Insurance Co., in the U.S. District Court for the District of Oregon.

Yoshida is a teriyaki sauce and soda company known for its line of Asian marinades and cooking sauces, which suffered a ransomware attack in 2021.

Yoshida Foods International LLC purchased insurance from Federal Insurance Co. that included computer fraud coverage under the crime coverage part of its policy.

In March 2021, an unknown hacker gained illegal access to Yoshida’s computer system and used malware to encrypt data in its storage devices, rendering the system unusable. 

The anonymous hacker demanded a ransom payment in cryptocurrency in exchange for each decrypting program.

President of Yoshida Foods, Junki Yoshida, used his personal cryptocurrency funds to pay the ransomware of $107,074.20 for the four decryption keys needed, for which the company reimbursed him.

The company then submitted a claim to Federal, but coverage was denied. The insurer’s position was that the company did not sustain a “direct loss” from computer fraud, with its only loss occurring when it reimbursed the company president, who was not personally insured under the policy.

In October 2021 Yoshida filed suit accusing its insurer of bad faith and seeking coverage for its losses. After a litigious court battle, the court ruled in favor of Yoshida finding that the company will be able to seek insurance compensation for money its founder paid from his personal cryptocurrency funds to acquire decryption keys from the anonymous hacker in order to restore his company’s data.

This week, U.S. District Judge Marco A. Hernandez found that the ransomware payment made by Junki Yoshida from his own personal BitCoin funds was an expense that was the result of a direct loss to his company, caused by the hacker, and should be covered by Federal Insurance Co.

Judge Hernandez rebuffed the insurer’s argument that since Junki Yoshida paid the hackers personally and was technically an employee, a contractual exemption for employee-approved transfers applied.

Judge Hernandez wrote in his ruling that “Under the defendant’s reading, if someone held a gun to an employee’s…

Source…