Tag Archive for: step

Going into the Darknet: How Cynet Lighthouse Services Keep Cybersecurity Teams One Step Ahead of Hackers


By monitoring the darknet, as well as underground forums, Cynet is able to identify and prepare for the latest cybersecurity threats before they reach deafening levels.

By Eyal Gruner, Co-Founder and CEO of Cynet

Data breaches are far from new, but the scale of attacks and sophistication of the attackers has reached all new levels in recent years. Since the pandemic, with the rise in remote work environments and work from home setups, compromised credentials became the most common initial access vector for data breaches in 2022 according to IBM – leading to rampant cybersecurity attacks. Because of the anonymity it offers, the darknet is fertile ground for bad actors looking to buy, sell, and trade large datasets of credential that can be used to access compromised accounts and systems left unchecked.

The alarming rise in compromised credentials led Cynet to launch its Lighthouse Service which monitors underground forums, private groups, and malicious servers for evidence of compromised credentials within the environment – taking its MDR team (CyOps) into the darknet and underground forums to search for potential cybersecurity threats before they become full-on attacks. Unlike traditional darknet monitoring services, Cynet focuses primarily on credential theft monitoring because of the swift rise in leaked credentials.

A Primer on the Darknet and Underground Forums  

Unlike the internet we all use to work, shop, and connect online, users must download a special Tor browser or browser add-ons to navigate the darknet. Because there is no link between a user and the user’s IP, the darknet requires specific access (software, configurations, authorization) – thus making it a prime location for illegal activity. Industry analysts estimate that the darknet accounts for 4% to 6% of internet content, with as many as three million users per day.

But the darknet is not the only gathering spot for cybercriminals. The internet we use on a daily basis (Clearnet) also houses underground forums that fuel and empower threat actors. The now seized “RaidForums” and its predecessor, “Breached,” are two popular sites that can be accessed via common web browsers. While the two are…

Source…

Here’s the 1 security step you can’t afford to skip on Windows PC or Mac


Cybercriminals are always looking for ways to get your money and info, and your phone has one vulnerability you probably never considered.

Stop making this simple and dangerous mistake.

Even your printer could serve as a way in for hackers. Here are the security steps you probably didn’t know you should take.

Stepping away from your computer creates an opportunity for hackers, crooks, or simply nosy people with nothing better to do than snoop. Here’s how to prevent them from getting a look at what you’re doing.

Protect your Windows PC

You probably lock your phone when you put it in your pocket without thinking about it, but what about your computer? The same principle applies — always lock your device.

Even if you trust the people around you, it doesn’t take more than a passing glance for someone to cause some serious damage. That’s especially true if you work from home and have sensitive business info on your computer.

Here are some ways to lock your Windows PC:

● Hit Windows + L to lock your computer in just one step.
● Press Ctrl + Alt + Del, then select the Lock option.

Make it easier on yourself and set your computer to lock automatically after a set amount of inactivity. On a Windows machine:

● Open Settings and go to Personalization, then select Lock Screen.
● Click Screen saver settings and select any option (except None) from the Screen saver dropdown menu.
● Set a time for Windows to wait before locking. A few minutes should be fine.
● Check the box for On resume, display logon screen then hit OK.
● Click the Start button, then select your user icon and hit Lock.

You can also set your PC to lock automatically when you step away from it. Windows uses devices paired with your PC via Bluetooth to help detect when you’re away. Pretty neat.

First, you need to pair your device. Your phone is a good choice since you will likely take it when you get up. Find instructions for pairing any device to Windows 10 here and Windows 11 here.

With your phone paired to your computer, here’s how to set your computer to lock when it senses your phone has moved away:

● Select Start > Settings > Accounts > Sign-in options.
● Select…

Source…

Is Louisiana’s ID Verification Mandate a Step in the Wrong Direction? – Global Village Space


It was recently announced that Louisiana had introduced legislation that requires users of adult websites to show identification to access the pages. This has stirred up plenty of questions about how much authority governments can have over the policing of the internet.

Aside from the ethical debates surrounding the news, it also feels like this is a step backward. Technology is moving forward rapidly, and improved methods of authentication are already emerging. A more sensible solution could be to jump on the growing trend of biometric technology for accessing websites.

What is the Louisiana Mandate?

PIA reported that lawmakers in Louisiana have decided to implement a new rule for accessing adult websites. In a push to ensure that children don’t encounter content that could be damaging to them, internet users in the state will now be required to use their personal identification credentials to log on.

Experts have noted how other countries, including the UK, Australia, and Germany, have all attempted similar measures in the past. None of these worked. In fact, collecting IDs for age verification can have serious knock-on effects when it comes to data privacy.

This highlights how there’s a need for more modern approaches to authentication that are in line with the advancing technological world. Biometrics has already started to creep in on devices and some sites. However, they haven’t become widespread or used as an alternative to traditional identification methods yet.

How Far Away are We From Ubiquitous Biometrics?

According to Grand View Research, the global biometrics market will be worth around $60 billion by 2025. It is growing at a rate of 20.4 percent each year, and this is being driven by the increased demand for enhanced security methods.

Issues Arising from Biometrics

For the technology to become used for logging onto all sites and devices, internet users need to have the reassurance that their data won’t be sold or lost to third parties.

Like it or not, biometric technology is on the way, and some people believe that it is a great step forward. There’s no doubt, though, that western countries will need to learn how to cope with these challenges. There…

Source…

The one security step you can’t afford to skip on your Windows or Mac


Cybercriminals are always looking for ways to get your money and info, and your phone has one vulnerability you probably never considered. Stop making this simple and dangerous mistake.

Even your printer could serve as a way in for hackers. Here are the security steps you probably didn’t know you should take

Step away from your computer creates an opportunity for hackers, crooks, or simply nosy people with nothing better to do than snoop. Here’s how to prevent them from getting a look at what you’re doing.

Get the free 5-minute daily tech newsletter that 400,000+ people read every day.

Protect your Windows PC

You probably lock your phone when you put it in your pocket without thinking about it, but what about your computer? The same principle applies — always lock your device. 

Windows computer

Windows computer (Cyberguy.com)

5 BEST HEADPHONES TO BOOST YOUR LISTENING FOR 2023

Even if you trust the people around you, it doesn’t take more than a passing glance for someone to cause some serious damage. That’s especially true if you work from home and have sensitive business info on your computer.

Here are some ways to lock your Windows PC:

  • Hit Windows + L to lock your computer in just one step.
  • Press Ctrl + Alt + Del, then select the Lock option.
  • Click the Start button, then select your user icon and hit Lock.

TECH HACK: Sending and receiving texts on your computer is a total time saver. Here’s how to set it up.

Make it easier on yourself and set your computer to lock automatically after a set amount of inactivity. On a Windows machine:

  • Open Settings and go to Personalization, then select Lock Screen.
  • Click Screen saver settings and select any option (except None) from the Screen saver dropdown menu.
  • Set a time for Windows to wait before locking. A few minutes should be fine.
  • Check the box for On resume, display logon screen then hit OK.

You can also set your PC to lock automatically when you step away from it. Windows uses devices paired with your PC via Bluetooth to help detect when you’re away. Pretty neat.

First, you need to pair your device. Your phone is a good choice since you will likely take it when you get up. Find instructions for pairing any device to Windows 10 here and Windows 11…

Source…