Tag Archive for: Web’

Web developer provides tips for hacking prevention


With the click of a button, hackers could be taking your personal information and access almost anything.

As someone who has been involved with computers since he was four, and currently working in web development, George Karabassis says it’s becoming easier for hackers to get your information.

“We are becoming more digitalized,” Karabassis said. “We’re more depending on the internet. There’s a sudden rise of cyber security.”

The Better Business Bureau says they often get calls from people who have given out information thinking they were on a legitimate website only to become victims of identity theft.

Even apps are being utilized as tools to gather personal information. Karabassis says there are ways to protect yourself and loved ones from online spies.

“We need to get into the habit to frequently change our passwords from our multiple social media accounts,” Karabassis said. “This is because there are multiple database leaks which are happening from multiple companies including Facebook or Twitter.”

Karabassis recommends changing your passwords at least every two months, and to create a backup password and user name for every account.

“To further secure your social media account so that even if hackers know your password they will still not be able to log into your account,” Karabassis said.

News

With the click of a button, hackers could be taking your personal information and access almost anything.
As someone…
More >>




13 hours ago



Saturday, June 12 2021


Jun 12, 2021


Saturday, June 12, 2021 5:05:00 PM CDT


June 12, 2021


Source…

Booming business on dark web :: WRAL.com


— The recent ransomware attack on the Colonial Pipeline has raised new concerns about cybersecurity.

Cyberattacks have grown during the coronavirus pandemic, and sites on the dark web are thriving with information and good obtained through those hacks, according to security experts.

“They’ve got everything from bank logins, credit cards, corporate intelligence,” says Neal Bridges, a cybersecurity expert and chief content officer for Cary-based INE. “There are quite a few known dark net marketplace websites that sell anything from drugs, guns, fake IDs, passports, credit card numbers, personal identifiable information.”

Most people surf the surface web, which accounts for only 4 percent of the internet. The deep web, which includes protected sites for medical and legal records, accounts for about 90 percent. The remainder is the dark web and its illicit activities.

Using a special browser to hide his identity and navigate the dark web, Bridges searched “Carolina” on one site and found plenty of hits:

  • A template for North Carolina driver’s licenses that sells for about $1
  • A Social Security number and a date of birth for a North Carolina resident.
  • Some 7.4 million records in North Carolina’s voter database.

“There’s a database leak from the NorthCarolina.gov website,” he said,

The majority of the personal information on the dark net was stolen through hacking or email scams, he said.

Simon Migliano, who researches sales trends on the dark web, said regardless of how the information is obtained, business has been booming during the pandemic.

“We’ve probably seen some of the most interesting movement over the past couple of years in the last 12 months,” he said. “What I would say is since the pandemic there’s been a lot more listings.”

Migliano attributed the increase to lockdowns that had more people at home spending more time on the internet buying more services and goods to survive the isolation.

“We’re seeing a lot more lifestyle brand accounts for sale on the dark web that we’ve never seen before,” he said. “The users on many of these…

Source…

Basic Internet & E-mail Skills : How Does Internet Security Work?



Menlo Security Launches Industry-First Secure Web Gateway (SWG) with an Isolation Core for Mobile Devices | National


MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–Mar 10, 2021–

Menlo Security, a leader in cloud security, today announced an industry first by extending its cloud-based Secure Web Gateway (SWG) to include web isolation for mobile devices. This new offering is designed to eliminate the threat of malware and phishing attacks when users are accessing the internet and email from their smartphones and tablets.

Mobile device usage continues to grow in the enterprise and the security risk has increased accordingly:

  • Browser vulnerabilities: Web browsers are increasingly being used to access new applications and cloud resources. This makes web browsers a significant target for attackers to exploit and gain a foothold in the enterprise. Recent research published by Menlo Labs showed how 83 percent of browsers were not patched within 30 days by enterprises after a Chrome update. Because mobile browsers are updated less frequently than desktop browsers, Menlo Labs anticipates the same problem with mobile devices. Two recent bugs fixed by Apple and Google on their web browsers that were actively exploited in the wild are leading indicators of the increasing focus on mobile browsers.
  • Phishing: According to industry research1, the surge in remote work has increased mobile phishing attacks by 37 percent globally and 66 percent in North America alone. The report found that unmitigated mobile phishing threats could cost organizations with 10,000 mobile devices as much as $35 million per incident, and up to $150 million for organizations with 50,000 mobile devices.
  • Malicious document download: Malicious file downloads on mobile devices are another area of risk. File-based threats are occurring with greater frequency and higher success rates as threat actors have continued to hone and adapt their social engineering and spear phishing skills to fit today’s trends, including the use of mobile browsers. Consider that hundreds of millions of users are now working remotely and relying on Software as a Service (SaaS) platforms and rich web apps to improve mobility and productivity. As a result, mission-critical files and documents increasingly live outside the corporate firewall,…

Source…