Posts

Scary new malware that live streams your screen

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Ever feel like somebody is watching you? Years of horror movies have given us a real sense of fear of being watched by unsuspecting people. When it comes to tech, malware could be the suspect. Millions of PCs are infected with malware. Tap or click here to check your Windows computer now.

Unfortunately, a new type of malware, called BIOPASS RAT, brings that fear of being watched into a terrifying new reality. If you want to avoid being spied on, you’ll need to be on the lookout for this newest threat.

This newest malware can be spotted if you know what to look for. Keep your eyes peeled and learn how to protect yourself before BIOPASS RAT comes looking to make your computer its next victim.

Here’s the backstory

Using Adobe Flash Player and Microsoft Silverlight, the malware hides inside the Python script to make its way onto your computer. Once it sneaks past your defenses, it’s able to record and broadcast your computer screen.

This allows thieves to sit unnoticed in the background for as long as it takes to capture footage of you entering secure details into your computer. This could include banking information, Social Security numbers and other personally identifying information, making identity theft a breeze.

Worried about being hacked? Here are 5 essential steps to protect yourself from ransomware

Protect yourself

The malware was initially spotted in faulty plugin downloads for online gambling sites. The best way to protect yourself is to be mindful of downloading plugins unless they come directly from a manufacturer’s website. Unfortunately, malware can still find its way even to manufacturer sites, so often, mindfulness is not enough to protect yourself.

Keep your software update

Malware and other cybersecurity threats are often successful because they find weak spots in a person’s computer to enter. These points of entry typically come from software not being up to date.

A great way to protect yourself is to keep all your systems and software updated. Keep…

Source…

Live from Long Island: Northport radio station rolls out round-the-clock coverage on cyber crime 

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


WCYB, an online radio station covering cybercriminals and digital defenders worldwide, debuted Thursday from Long Island.

The Northport station, a unit of 6-year-old Cybersecurity Ventures, is the first to offer round-the-clock coverage of online breaches 365 days a year, said founder Steven C. Morgan.

“There are dozens, if not hundreds, of cybersecurity podcasts,” he said. “But launching and operating a full-blown radio station is entirely different. It’s a heavy lift to get up and running and staff.”

The station, dubbed Cybercrime Radio, at https://cybersecurityventures.com/radio/, began webcasting at 11 a.m. Thursday.

The station’s first broadcast day included a recorded interview with Kevin Mitnick, whose exploits as a hacker were chronicled in books and movies.

Mitnick, now chief hacking officer at KnowBe4 Inc., a Clearwater, Florida, computer security company, eluded an FBI dragnet until his arrest and 1999 guilty plea on wire fraud and computer fraud charges.

In the interview, Mitnick described a hack as a 16-year-old, when he commandeered the drive-up communications system at a McDonald’s, lampooning customers and managers.

Paul Trapani, president of the Long Island Software & Technology Network (LISTnet), said threats posed by hackers are creating “a huge demand” for the kind of content offered by WCYB.

Cybersecurity is “starting to evolve as its own industry,” he said, with many companies adding the position of chief information security officer.

Morgan said that damages from cyberintrusions will cost $6 trillion…

Source…

Greg Gutfeld: We live in the age of hyperbole

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


It was the worst of times, it was the worst of times. The United States today: it’s Watergate, 9/11, the Civil War, the potato famine, and the cancellation of “Sex and the City” all rolled into one. Thank god, due to climate change, the world’s supposed to end in eight years. That reminds me. I gotta pick up my shirts at the cleaners.

So, why is everything so bad? Because we live in the age of hyperbole. In fact, some say we’re living in the greatest, most incredible era of hyperbole since the beginning of time! In which hacks use extreme rhetoric to scare you into submission. 

If you don’t wear a mask outside while jogging, you have blood on your hands! If you support the cops, you’re a racist, with blood on your hands. And if you cut your finger slicing tomatoes, you have blood on your hands. (Well, that would be true.) But even more – if you disagree with Joe – you might just as well be Jefferson Davis himself.

Joe Biden, 7/13: The assault on free and fair elections is just such a threat — literally. I’ve said it before. We’re facing the most significant test of our democracy since the Civil War. It’s not hyperbole — since the Civil War.

Joe Biden literally doesn’t know the meaning of the word literally. I mean – Joe says it’s not hyperbole – cuz he knew it was hyperbole the moment he said it. You could say he has hyperbole on the brain. And boy, hyperbole must be very lonely.

It’s weird how a month of challenging a contentious election — makes you worse than a pro-slavery confederate flag-waving, non-recycling Democrat. But Joe’s party spent four years doing the same thing, with the 2016 election. The irony is thicker than Brian Stelter’s thighs. Still, the hyperbole continues.

Now, remember, during the Civil War – those Confederate Democrats may have owned slaves – but they never put on red hats, wandered into the capitol, and stole office supplies from Jerry Nadler! 

Joe Biden, 7/13: Confederates, back then, never breached the Capitol as insurrectionists did on January 6. I’m not saying this to alarm you. I’m saying this because you should be alarmed 

So, wait a second, pal. January 6th shouldn’t have alarmed you – because, by January 6th, you should have…

Source…

Live Webinar | Implementing a Zero Trust strategy to protect IP in Manufacturing – BankInfoSecurity.com

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360



Live Webinar | Implementing a Zero Trust strategy to protect IP in Manufacturing  BankInfoSecurity.com

Source…