Tag Archive for: stay

This info-stealing malware is hiding in downloads for popular apps — how to stay safe


Downloading new apps on your computer is usually a simple and straightforward process, but you now need to be extra careful when doing so as hackers have begun impersonating popular apps to spread malware.

According to a new blog post (opens in new tab) from the cybersecurity firm Cyble, hackers have begun using phishing pages designed to impersonate a number of popular apps online. While a user may think they’re downloading a widely used app, they’re actually installing malware on their computer.

Source…

Hacking baby monitors can be child’s play: Here’s how to stay safe


Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

We’ve probably all read horror stories online: a parent is woken in the middle of the night by strange noises coming from their child’s bedroom. They open the door, only to find a stranger “talking” to their baby through the monitor. While rare, such cases do happen from time to time.

Smart technology has provided us with numerous ways to keeping our houses safe(r), from smart locks and doorbells to home security cameras. But when gadgets are fitted with computing power and internet connectivity, they also become a target for remote hackers.

Fortunately, a few best practices can help to provide peace of mind that your baby monitor will be doing its job, and not the bidding of a stranger, and doesn’t itself become a security and privacy risk.

How can hackers hijack baby monitors?

Why would anyone want to hijack a baby monitor? Some are just looking to play a prank. Others may have more voyeuristic aims in mind. And some may even be looking to steal personal information overheard on the monitor, or confirming the house is empty so it can be burgled.

Whatever the reason, there are two main ways to hack a baby monitor. They depend on the kind of monitor it is:

Radio frequency monitors require an eavesdropper to be within range of the signal and know the frequency it is using. Both this, and the fact that most leading products of this type use encrypted communications, make these models a safer bet overall, albeit with more limited functionality.

Wi-Fi monitors are more exposed to hacking because they connect to the home router and, often, out to the public internet. The latter support functionality which allows parents to view the video feed via a mobile app, wherever they are. While this could provide peace-of-mind when out and about, it also opens the door to remote hackers, who might be scouring the web looking for unsecured cameras to hijack.

Even devices that don’t offer this functionality could theoretically be hacked if…

Source…

Trick or treat? Stay so cyber‑safe it’s scary – not just on Halloween


Gather around, folks, to learn about some of the ghastliest tricks used by criminals online and how you can avoid security horrors this Halloween and beyond

Trick or treat, it is Halloween! The day has come when children knock on your door dressed in scary costumes and ask for a treat. Be ready…or a spooky spell will be cast upon you!

The real danger, however, doesn’t knock on the door. Hackers, imposters and scammers of all ilk are looking for you in all corners of the internet, and all they want is to trick you into giving away your personal data or money.

With Cybersecurity Awareness Month ending on the last day of October, it’s a good time to look at some common ways your personal information could be at risk (not just this Hallow’s eve!) and offer up some sweet treats to help you and your family avoid falling for hackers’ tricks.

Self-defense against scammers’ tricks

Trick #1: Fake websites

vs.

Treat #1: Recognizing phishing attacks

So someone messaged you on Instagram about an amazing Bitcoin deal. Awesome! And is it just as simple as clicking a link? Even better. Or not? Let me guess, it will take you to a site that looks super professional and convincing and there’s a place to enter your credit card details to get started? Yes? Then that’s most certainly a scam. And it becomes even harder to tell right away if a website is real or when it’s a fraudulent version of well-known crypto exchanges.

In order to avoid falling for scams involving fake websites, especially those that request your personal information or banking details, make sure to:

  • Avoid clicking on links in unsolicited messages, doubly if the message came out of the blue and uses a generic salutation.
  • Don’t ever feel rushed into taking an action.
  • Watch out for misspelled domains and once on a website, use common sense to look out for other red flags, such as suspicious grammar mistakes or low-resolution images.
  • Consider manually typing out the website’s address into the browser bar and/or try Google’s  Safe Browsing site status tool or VirusTotal’s URL checker to…

Source…

WCC Corner: How to stay cyber-safe — give malware the boot


Jessica Griffin

Wilson Community College, in partnership with Greenlight and Gig East, is hosting a free virtual event soon, and anyone is welcome to attend. In fact, this is the fourth time we’ve partnered with them to host an event of this nature. 

“Cyber Safe in the Gigabit City v4.0: Give Malware the Boot!” is set for Thursday, Oct. 6, from 10-11:30 am.  You’ll get to hear from a panel of local business and industry experts on malware, its common infection paths, the types of information malware can steal from a compromised system and how to defend against malware.

“There are very few aspects of our lives now that do not have some type of fingerprint online. It’s more important than ever for people to be aware of ways to protect themselves from cybercriminal activity. This annual event gives our community the opportunity to hear from the best of the best on how to do just that,” said Wes Hill, dean of continuing education at WCC.

WCC’s information technology instructor, Kendra Faulkner, said, “We are so excited to continue this event for a fourth year, and even better, hear about cybersecurity from a military perspective.” 

This year’s keynote speaker is Alex Reinwald, cyber-threat intelligence division chief for the North Carolina National Guard’s Cyber Security Response Force. His previous duty assignments include Japan, South Korea, Arizona and Alaska. He holds a bachelor’s degree in geography from the University of Alabama and a master’s in geographic information science and technology from North Carolina State University. 

He has twice led the fusion and intelligence cell for the largest unclassified cyber incident response exercise in the United States. He currently holds GIAC certified incident handler, GIAC penetration tester, GIAC cyber threat intelligence and GIAC information security professional SANS certifications.

Our panelists include Fred White, network technician for the city of Wilson/Greenlight Community Broadband; Joseph Vellucci, technician/project manager for Computer Central; Nona Young, network security specialist for the N.C. Department of Information Technology; and Susan Weekley, IT…

Source…