Tag Archive for: safe

Mumbai Police Issues Advisory On Email Bombing For Citizens To Stay Safe From Online Threat


The Mumbai police on Friday issued an advisory for citizens on a lurking email bomb cyber attack. An email bomb is a form of net abuse that sends large volumes of email to an address, making the mailbox overflow and overwhelm the server. This smoke screen distracts the attention from important email messages, indicating a security breach.

Methods Of Email Bomb Attack

There are three ways of carrying out an email bomb attack, including mass mailing, linking lists, and zip bombing, according to the advisory.

‘‘Mass mailing consists of sending numerous duplicate emails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a Distributed Denial-of-Service attack by employing the use of botnets, hierarchical networks of computers compromised by malware and under the attacker’s control,” the advisory states.

The advisory further reads, “As in spamming, the attacker instructs the botnet to send out millions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood,” it said.

“This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each infected computer sending a different message or employing stealth techniques to defeat spam filters,” it said, adding that “a zip bomb is a variant of mail-bombing”.

Details On Email Cluster Bomb Attack

“List linking, also known as ‘email cluster bomb’, means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts,” said the advisory.

“This is easy, almost impossible to trace back to the perpetrator, and potentially very destructive. To prevent this type of bombing, most email subscription services send a confirmation email to a person’s inbox,” it said.

“It is generally advisable not to click…

Source…

Hacking Attempts in the Education Sector Are On the Rise. Here’s How Schools Can Stay Safe from Cyberattacks.


 

Educational institutions are facing a surge in cyberattacks targeting IoT (Internet of Things) devices like IP cameras, network video recorders, and routers, according to recent data published by Check Point Research. In fact, the cybersecurity solutions provider states that there has been a 34% increase in cyberattacks when compared to last year. How can schools and other organizations stay safe from hacking attempts in the education sector?

Experts believe that schools and universities need to focus on vulnerability management. Basically, this process involves the continuous identification and resolution of potential weaknesses or flaws, such as bugs and firewall misconfigurations. These give hackers a chance to steal data and cause harm. Even something as simple as regularly updating software and installing antivirus solutions can help prevent unauthorized access to confidential data like the addresses and medical records of students.

BlueSteel Cybersecurity CEO Ali Allage, who has two decades of experience in leading tech companies, tells us how schools can stay safe from cyberattacks and institute better strategies against hacking attempts in the education sector.

 

Ali’s Thoughts

“So, my thoughts on the topic of the education sector seeing an increase in attacks is not surprising just because of how much the education system had to transition [during] and after covid on technology use. There’s been a lot of quick adoption without necessarily having the right frameworks in order to support remote education or adopting some of the technologies needed for today’s educational world. So, part of that is not having a grasp on vulnerability management, and this is using these tiny devices, like I mentioned [IoT devices] like cameras, [some] of these hardware pieces that sometimes get overlooked on firmware. Making sure that the software that goes to run the hardware are up to date. And, so we’ll see a lot in terms of vulnerability management not necessarily getting the love or attention it needs, or you’ll see that they’re identifying some of the issues — It’s just that the breadth of items that need to be addressed are pretty large and it could be…

Source…

Cities battle to keep their computer systems safe from cyberattacks


AUGUSTA, Ga. (June 2, 2023) – Hackers continue to make more frequent and sophisticated attempts to infiltrate municipalities and government computer systems. In the past month, Augusta, Georgia, and Dallas, Texas, are among the cities that have seen system breaches. Some of the unauthorized access is simply people clicking on a wrong link while others are premeditated attempts to steal data through the breach.

They aren’t easy to defend, but everyone, including individuals, governments and businesses, need to be vigilant with their protocols and security.

Michael Nowatkowski is the head of the cyber program of study in the School of Computer and Cyber Sciences at Augusta University and knows there are a lot of bad actors out there.

“There’s potential if they are able to get onto your system that it would be something like ransomware, where they would prevent you from using your data,” said Nowatkowski.

He added it might not be just for monetary gain. They could simply eavesdrop and collect data without anyone’s knowledge.

“You want to find them as quickly as possible so they can’t perform these malicious activities or sit in a dormant state just collecting data for a long period of time,” he added.

When it comes to attacks on cities, Nowatkowski said the bad actors may just want to discredit the city or agency by defacing their web pages. Other cases, they may force a ransomware attack to get money out of the city to re-access their data.

He added it’s a challenge to prepare and defend for the attacks, as you never know what the attack vector is going to be.

“For cities to defend, they always have to be vigilant. They should try to encourage their users to use the systems responsibly. User education is a very big step and is a proactive step in defending your networks,” said Nowatkowski.

He also said if an attack did happen, it’s important to look for ways to prevent future attacks, try to figure out the root cause of how the attack happened and put measures into place to prevent them from happening in the future. This may include having a third party come in and do an assessment of the network to look for vulnerabilities.

Source…

How safe are your passwords? Make yours harder to hack on May 4, World Password Day


World Password Day is Thursday, May 4, and although it’s not cause for celebration, you might want to mark the occasion by taking a look to see if you’re the target demographic.

Internet safety is a must, especially when it comes to keeping the safety of your personal accounts uncompromised or avoiding a company data breach.

Making sure your backup accounts are up to date and enabling multi-step security measures are all worthwhile efforts, but the most important step is to make sure you have a strong password. Many people don’t.

How safe is your password?

Are your online passwords safe? Celebrate World Password Day on May 4 by checking their strength.

Are your online passwords safe? Celebrate World Password Day on May 4 by checking their strength.

Compared to data from 2021, 73% of the 200 most common passwords in 2022 remain the same. Eighty-three percent of the most common passwords used in 2022 can be cracked in less than a second, according to a study by NordPass, a password manager for businesses and consumers, that analyzed password data.

What are the most popular passwords?

In 2022, “guest” was the most common password in the United States, followed by “123456.”

The rest of the top 20 are as follows:

  • password

  • 12345

  • a1b2c3

  • 123456789

  • Password1

  • 1234

  • abc123

  • 12345678

  • qwerty

  • baseball

  • football

  • unknown

  • soccer

  • jordan23

  • iloveyou

  • monkey

  • shadow

  • g_czechout

If you don’t see any of your passwords used on this list, congratulations! But you’re not out of the woods just yet.

Sales up in smoke NJ legal weed: Medical marijuana numbers plummeting, so where are patients going?

What do I need to know about creating a safer password?

NordPass found that pop culture heavily influences the passwords people choose around the world, and the most common categories people pull from include fashion brands, swear words, sports, movies, foods, video games, artists and cars.

Weak passwords for apps on your phone or other online accounts can make it easier for hackers to breach your accounts and potentially steal your information.

Weak passwords for apps on your phone or other online accounts can make it easier for hackers to breach your accounts and potentially steal your information.

“Tinder” was used 36,384 times for Tinder users. Creative, right?

We’ll raise that with 8,547,304 appearances from “fish,” 8,118,950 appearances from “kia” and 2,210,441 appearances from “nike.”

“Oscars,” yes, like the coveted award ceremony each year, was used…

Source…