Skip to main content
This is a weekly highlight of the best articles and news going on in the Community.

 

See any stories that catch your interest? What would you like to see in the future? Let us know in the comments below!

 



 

Cybersecurity Trends to Watch Out for in 2019

 

Megan Johnson, Communcations Manager, put together a great 2019 trend piece on the Webroot blog today that I thought I'd share. What are you watching out for in 2019? What are your predictions?

 

The cybersecurity landscape is in constant flux, keeping our team busy researching the newest threats to keep our customers safe. As the new year approaches, we asked our cybersecurity experts to predict which security trends will have the most impact in 2019 and what consumers should prepare for.

 


  • Continued Growth of Crptojacking
  • General Data Protection Regulation (GDPR) Influence

  • Biometrics on the Rise
  • The Beginning of the End for SSNs
  • Certification for the Internet of Things
  

See the full article here.

____________________________________________________

 

2018 In Review IoT Security

 

David Dufour, VP of Engineering & Cybersecurity at Webroot, warns that when it comes to IoT devices a combination of specific security approaches with legislative restrictions are needed to ensure that these devices and our information is secure. 

 

IoT is still in its security infancy and the array of new (debatably useful) connected devices available, such as the smart toaster that prints the weather on your bread, creates a larger attack surface to defend, which when compromised could grant an attacker access to sensitive and valuable data. Physical security of these devices is also often overlooked; whether it’s a smaller device that can be stolen, or a device left unattended that can be targeted, businesses from every industry need to take control of their own security, understanding the risks associated with connecting more and more devices to the network. Devices need to be maintained and monitored, moving away from the current ‘set-it and forget it’ mentality. In addition, understanding how and what data a device collects, stores and communicates is crucial to securing sensitive data.

 

See the full article here.

_____________________________________________________

 

Hackers find a way to bypass Gmail two-factor authentication

 

Two-factor authentification has been hailed as a significant move forward in providing online security, letting us log in with confidence to sites such as Gmail. Websites that once required an insecure password now need a complex password with a second form of authentication from a mobile device, or implement other two-factor systems.

 

However, as with everything, two-factor authentication isn’t impervious to flaws, and a new report by Amnesty International details how hackers have been phishing two-factor codes. 

 

See the full article here.

_____________________________________________________

 

FTC Warns of Netflix Phishing Scam Making Rounds

 

The scam targets Netflix users and asks for payment information. The Federal Trade Commission (FTC) is warning of a new phishing scam reeling in Netflix customers and stealing their payment information.

 

According to a post published by the FTC, Wednesday, the spotted scam purports to be an email from Netflix. The email claims that the victim’s account was put on hold due to billing issues, and asks the victim to update their payment method.

 

“Police in Ohio shared a screenshot of a phishing email designed to steal personal information,” said Colleen Tressler, consumer education specialist with the FTC in a post. “The email claims the user’s account is on hold because Netflix is ‘having some trouble with your current billing information’ and invites the user to click on a link to update their payment method.”

 

In reality, the bad actors who sent the email are pocketing that payment information.

 

See the full article here.

_____________________________________________________

 

New Tech Support Scam Causes Chrome Browser to Use 100% of the CPU

 

A new tech support scam has been discovered that uses JavaScript to create a loop that ultimately causes Google Chrome to use up all of the CPU resources on the computer and freeze the browser.

 

This new tech support scam variant was reported in a Google Chrome bug report that states that once a user visits the page, the CPU utilization quickly goes to 100%.

 

See the full article here.

 
Be the first to reply!

Reply