Phishing emails caught exploiting DocuSign and COVID-19

Cybercriminals are exploiting DocuSign, the coronavirus, and the transition to remote working to try to capture account credentials. … The phishing email itself tries to look legitimate by copying the content and images of real emails from DocuSign. … Clicking on the button to review the documents redirects the user several times, first through the SendGrid link and then through two compromised websites. These redirects are created specifically to confuse the user and to get past URL detection security. In the end, the page that comes up is a malicious one …

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Have you encountered this yet?

Join the conversation on our Facebook Page!

Best password managers for business in 2020

Everyone needs a password manager. Period, full stop. It’s the only possible way to maintain unique, hard-to-guess credentials for every secure site you, your family members, and your team access daily.  The 15 programs listed in this guide share many core features.  On a Windows PC, a Mac, or a mobile device, you install a stand-alone program or browser extension that does the work of saving sets of credentials in a database whose contents are protected with high-grade, 256-bit encryption. To unlock the password database, you enter a decryption key (your master password) that only you know. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

What do you like your current password manager?
Join the conversation on our Facebook Page!

 

Spear-phishing campaign compromises executives at 150+ companies

A cybercrime group operating since mid-2019 has breached the email accounts of high-ranking executives at more than 150 companies, cyber-security firm Group-IB reported today.  The group, codenamed PerSwaysion, appears to have targeted the financial sector primarily, which accounted for more than half of its victims; although, victims have been recorded at companies active across other verticals as well.  PerSwaysion operations were not sophisticated

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you prepared for these attacks?
Join the conversation on our Facebook Page!

 

7 Cybersecurity tips for small businesses with remote workers

Small businesses have been facing a mountain of problems since the coronavirus outbreak took hold of the world’s economy and shifted most people to working from home. Millions of small businesses around the world, which previously had no experience dealing with cybersecurity, suddenly had to deal with a deluge of new issues… start small…  Troy Gill, manager of security research at Zix-AppRiver, said all small businesses should start simple and work their way up. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How are you helping your team and your business remain safe?
Join the conversation on our Facebook Page!

 

Best encryption software for business in 2020

If strong encryption and security practices are not in place, businesses are not only opening themselves up to potential cyberattacks, but also the loss of corporate and customer information, fines for non-compliance with laws including HIPAA and GDPR, financial damage, and the loss of reputation.  Below, we list our favorite encryption solutions, suitable for users, SMBs, and enterprise players…

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you encrypting everything in your workplace?
Join the conversation on our Facebook Page!

Ensure Success Using the Top Ten Remote-worker’s Checklist

Now that millions are working from home, the challenges will become clear. Here are 10 to watch out for. …  to help you keep the company ship afloat – while also preserving your sanity.  It is  important to secure enough bandwidth…  it is important that security concerns stay top-of-mind throughout the entire process. A global crisis is a playground for cyber criminals…

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you taking care of your top 10 needs?Join the conversation on our Facebook Page!

“Smart WiFi” users must reset your password

Router vendor Linksys has locked user accounts on its Smart WiFi cloud service and is asking users to reset passwords after hackers have been observed hijacking accounts and changing router settings to redirect users to malware sites.  Linksys’ decision only impacts Smart WiFi accounts.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you using Smart Wifi?Join the conversation on our Facebook Page!

Who has banned Zoom? Google, NASA, and more

Video conferencing app Zoom has had a massive increase in users because of new remote work requirements due to the COVID-19 pandemic. That spike in users also exposed a growing list of security flawsZoom bombing trolls have emerged, user email addresses and photos have leaked, calls aren’t being end-to-end encrypted, and flaws found in the Zoom installer allow an attacker to gain root access to computers that run a malicious version of it.

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Are you still using Zoom?

Join the conversation on our Facebook Page!

71% of Security Pros See Threats Jump Since COVID-19 Outbreak

Cybercriminals are exploiting fears around the COVID-19 pandemic to tailor their threats, and businesses are feeling the effects: 71% of security professionals surveyed have seen an increase in security threats or cyberattacks since the coronavirus outbreak began, researchers report.

DarkReading.com click the link to read the rest of the story.  Get our free tools here.

What threats are you seeing?Join the conversation on our Facebook Page!

Working from home? Stay connected using Microsoft Teams, for free

Microsoft Teams is a collection of online services that you can access through a web browser (at https://teams.microsoft.com) or through the Teams app, which is available for Windows, MacOS, iOS, and Android. … That combo of apps and services gives you the ability to invite people to join your organization and create teams for different groups; everyone in your organization can chat, with Slack-like channels within each team for group conversations; and private chat capabilities allow 1:1 and group conversations, with the option to add audio and video and share screens.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you used Teams yet?Join the conversation on our Facebook Page!

Remote-work rush created a playground for cybercrooks

Most organisations have a disaster recovery plan and a business continuity… Far fewer are prepared for a crisis requiring social distancing and working from home for long periods on a massive scale. … Hence the rush to buy laptops and webcams and other equipment to kit out home offices…

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How are you protecting your business?Join the conversation on our Facebook Page!

 

Cyber criminals are trying a new trick to cash in on Zoom’s popularity

Cyber criminals are bundling malware inside installers of video-conferencing application Zoom in an effort to lure victims into unwittingly infecting their computers with malicious software.  As the coronavirus outbreak forces organisations around the world to shift towards remote working, Zoom has become the top choice of video-conferencing software for people – both when it comes to work and socialising.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Are you still using using Zoom, if not, what are you using?Join the conversation on our Facebook Page!

How to Tell If Your Employees are a Cybersecurity Threat

The biggest threat to your business and its data does not come from the outside.  It originates from your own employees. Either through well-meaning ignorance or active malice, they have the potential to put your data at risk to an incredible degree. Here’s how you can tell you’re at risk.  Like it or not, the greatest threat to your data comes from within. …

Technative.io click the link to read the rest of the story.  Get our free tools here.

How do you protect your office?Join the conversation on our Facebook Page!

There’s now COVID-19 malware that will wipe your PC and rewrite your MBR

With the coronavirus (COVID-19) pandemic raging all over the globe, some malware authors have developed malware that destroys infected systems, either by wiping files or rewriting a computer’s master boot record (MBR).  With help from the infosec community, ZDNet has identified at least five malware strains… This image appears just before it gets worse…

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you stop these? Try Cylance?Join the conversation on our Facebook Page!

 

Coronavirus used in email phishing attacks – a 667% increase

There has been a steady increase in the number of coronavirus COVID-19-related email attacks since January, according to security firm Barracuda Networks, but researchers have observed a recent spike in this type of attack, up a whopping 667% since the end of February. …

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your office?

Join the conversation on our Facebook Page!

 

 

New Zoom Users beware: Hackers Now Targeting You

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake “Zoom” domains and malicious “Zoom” executable files in an attempt to trick people into downloading malware on their devices. …

TheHackerNews.com click the link to read the rest of the story. Our FREE Tools can help!

Are you using zoom yet? Update software now?Join the conversation on our Facebook Page!

 

FBI issues warning about COVID-19 stimulus-package scams

Hackers and scammers online have ramped up attacks to take advantage of the coronavirus pandemic, and that could mean targeting the US COVID-19 relief effort next, the FBI has warned.

CNet.com click the link to read the rest of the story.  Get our free tools here.

Have you been scammed yet?Join the conversation on our Facebook Page!

These home appliances slow down your internet speed

Halogen lamps, electrical dimmer switches, stereo or computer speakers, fairy lights, TVs and monitors and AC power cords have all been known to affect routers. Keep your router as far away as possible from other electrical devices

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

What devices have you found to be slowing down your internet speeds?Join the conversation on our Facebook Page!

Hackers attacking Citrix and Zoho users during lockdown

The global operation by hacking group APT 41 – widely believed to linked to the Chinese government – targeted businesses in telecoms, manufacturing, healthcare, defence, higher education, pharmaceuticals, banking, media, oil and gas, chemicals, plus government.  Campaigns by APT 41 are often deployed in an effort to steal intellectual property…

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your remote users?Join the conversation on our Facebook Page!

Work from home: Essential gadgets and gear for productivity

One thing that I’ve learned to do is to make technology work for me, and with that in mind, here’s a list of what I believe to be essential gadgets and gear if you find yourself working from home because of the coronavirus outbreak.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

What devices have helped you the most, working from home?Join the conversation on our Facebook Page!

The Dos and Don’ts of Online Video Meetings

In the age of coronavirus, many of us have transformed overnight from office workers into telecommuters. And we are increasingly relying on videoconferencing apps like Zoom and FaceTime to correspond with our peers.  But inevitably, with our homes and workplaces merging into one, the boundaries between our personal and professional lives are beginning to erode — and awkward situations have ensued. …

NewYorkTimes .com click the link to read the rest of the story.  Get our free tools here.

What other do’s and don’t are there?Join the conversation on our Facebook Page!

Routers hacked to point you to coronavirus-themed malware

For almost a week, a group of hackers has been breaking into people’s routers and changing DNS settings in order to point unsuspecting device users to coronavirus-related sites pushing malware. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you protect your home from these threats?Join the conversation on our Facebook Page!

Half of firms have spotted a cyberattack – and here is the most common one you will face

Almost half of businesses have experienced a cyberattack or data breach in the past year – and almost all of the organisations that know they’ve been on the receiving end of attacks have reported being targeted by phishing and other fraudulent emails

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

How do you stop phishing attacks?Join the conversation on our Facebook Page!

‘Unfixable’ hole in Intel ROM exposes all but latest chips to attack

Security researchers have discovered a hole in Intel’s read-only memory that it believes cannot be fixed and leaves all but Intel’s latest 10th-generation devices exposed. The discovery, announced Thursday by security firm Positive Technologies…

Cnet.com click the link to read the rest of the story.  Get our free tools here.

How will your firm deal with this?Join the conversation on our Facebook Page!

Password managers: A little pain for a lot better security

If you’re one of the countless people who unwisely use easy-to-guess passwords or reuse a password for several accounts, cybersecurity experts have a message for you: It isn’t your fault. Memorizing a unique, complex password for each account is impossible. … That’s why many cybersecurity experts suggest using a password manager.

Cnet.com click the link to read the rest of the story.  Get our free tools here.

Do you use a password manager? Join the conversation on our Facebook Page!

Microsoft case study: customer under attack by 6 hacker groups

Imagine discovering six threat actors all at the same time!  Recently, Microsoft’s Detection and Response Team (DART) was engaged by a large, multinational company that faced a sophisticated, state sponsored advanced persistent threat.

Microsoft.com click the link to read the rest of the story.  Get our free tools here.

How will you protect your business?Join the conversation on our Facebook Page!

Nasty phishing scams aim to exploit coronavirus fears

Cyber criminals are aiming to take advantage of fears over coronavirus as a means of conducting phishing attacks and spreading malware, along with stealing login credentials and credit card details.  Cybersecurity companies have identified a number of campaigns by hackers who are attempting to exploit concerns about the COVID-19 outbreak for their own criminal ends.

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Have you seen any of these attacks?Join the conversation on our Facebook Page!

Ransomware victims are paying out millions a month. One has cost them the most

Over six-and-a-half years, ransomware victims have handed over vast amounts of bitcoin to crooks. Some variants of the malware have generated more ransom than others. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Has you company been hit with this?Join the conversation on our Facebook Page!

“Shark Tank” star loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. … “I lost the $388,700 as a result of a fake email chain sent to my company,” she told the magazine. “The scammer disappeared and I’m told that it’s a common practice, and I won’t be getting the money back.” …

CBS.com click the link to read the rest of the story.  Get our free tools here.

Is you team trained in how to spot these scams?Join the conversation on our Facebook Page!

ElectionGuard could be Microsoft’s most important product in 2020. If it works

ElectionGuard isn’t designed to make voting machines safe from hackers. It’s meant to make hacking them pointless. … With ElectionGuard, Microsoft isn’t setting out to create an unhackable vote — no one thinks that’s possible — but rather a vote in which hacks would be quickly noticed.

Cnet.com click the link to read the rest of the story.  Get our free tools here.

Do you think this will solve the problem?Join the conversation on our Facebook Page!