Skip to main content
This is a weekly highlight of the best articles and news going on in the Community.

 

See any stories that catch your interest? What would you like to see in the future? Let us know in the comments below!

 



 

 

After the Hack: Tips for Damage Control

 

According to the Identity Theft Research Center, in 2017 alone, nearly 158 million social security numbers were stolen as a result of 1579 data breaches. Once a cybercriminal has access to your personal info, they can open credit cards, take out loans that quickly ruin your credit, or leave you with a giant bill. But that’s not all. Many people don’t realize that, depending on how much information a hacker gets and what their intentions are, you could lose a lot more than money. From sending malware to your contacts from your account to spamming your coworkers with phishing attacks to compromise your employer’s network, the damage a hacker can wreak on your personal and professional life can extend far beyond the monetary bounds.

 

See the full article here.

 

_____________________________________________________

 

5 signs you've been hit with an advanced persistent threat (APT)

 

 

Advanced persistent threat (APT) hackers and malware are more prevalent and sophisticated than ever. APTs are professional hackers, working either for their government or relevant industries, whose full-time job is to hack specific companies and targets. They perform actions relevant to their sponsor’s interests, which can include accessing confidential information, planting destructive code, or placing hidden backdoor programs that allow them to sneak back into the target network or computer at-will.

 

See the full article here.

 

____________________________________________________

 

Researchers discover next generation phishing kit

 

Researchers at Check Point and CyberInt, have discovered a new generation of phishing kit that is readily available on the Dark Web. Created by a cyber-criminal known as ‘oa]pache’, the kit makes it simple for those with very little technical ability to carry out their own cyber-attack. By simply downloading this multi-functioning phishing kit and following the straightforward installation instructions, a threat actor is able to launch a phishing campaign, that collects the personal and financial information of unsuspecting consumers, very quickly.

 

See the full article here.

 

_____________________________________________________

 

 

Most dangerous attack techniques, and what’s coming next

 

 

Experts from SANS presented the five most dangerous new cyber attack techniques in their annual RSA Conference 2018 keynote session in San Francisco, and shared their views on how they work, how they can be stopped or at least slowed, and how businesses and consumers can prepare.

 

 

The five threats outlined are:

 

1. Repositories and cloud storage data leakage

2. Big Data analytics, de-anonymization, and correlation

3. Attackers monetize compromised systems using crypto coin miners

4. Recognition of hardware flaws

5. More malware and attacks disrupting ICS and utilities instead of seeking profit.

 

See the full article here.

 

_____________________________________________________

 

New names for a few of our boards

 

Some of you may have noticed already, but we have renamed a couple of our boards. The first one, "Non-Techie" has been renamed to, "Water Cooler". The second, "Techie" has been renamed to, "Tech Talk". The idea here is to make the forum more comprehensible for those unfamiliar with our Community.

 
Be the first to reply!

Reply