Five ways that backup has changed since the days of tape

Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Backup has changed almost beyond recognition in the past decade or so. Traditional backup, to tape that was moved offsite with a secondary site to operate from in case of disaster,Continue reading “Five ways that backup has changed since the days of tape”

Mozilla Firefox’s new feature will make it harder for ISPs to spy on you

Mozilla is pressing ahead with its controversial DNS-over-HTTPS (DoH) feature that many across the United States and the United Kingdom have lobbied against. The update will add an additional layer of encryption to your internet traffic and makes it more difficult for ISPs to snoop on your browsing data. Whenever you punch in a webContinue reading “Mozilla Firefox’s new feature will make it harder for ISPs to spy on you”

Ransomware-hit US gas pipeline shut for two days

A ransomware attack on a US natural gas facility meant a pipeline had to be shut down for two days, the US Department of Homeland Security (DHS) has said. However, it did not name the facility or say when the attack happened. A malicious link sent to staff at the facility eventually caused the shutdownContinue reading “Ransomware-hit US gas pipeline shut for two days”

New Office 365 Phishing Attack Targets OAuth Apps Instead of Credentials

Trying to steal your username and password is so “yesterday.” The 2020 Hacker is now leveraging Office 365 OAuth APIs to gain control over user mailboxes with phishing tactics. The usefulness of a captured Office 365 user logon to an attacker is only valuable until the logon’s owner realizes they’ve been compromised, and their password is changed.Continue reading “New Office 365 Phishing Attack Targets OAuth Apps Instead of Credentials”

Research Security Tech IBM Study: Data Breaches a Growing Risk for Small Business | 2019

Smaller companies have higher breach-related, per-employee costs than larger organizations. An annual IBM security breach study released today (July 23, 2019) reveals that the cost of a data breach has risen 12% over the past five years and now costs $3.92 million on average. These rising expenses are representative of the multiyear financial impact of breaches, increased regulation and theContinue reading “Research Security Tech IBM Study: Data Breaches a Growing Risk for Small Business | 2019”

How To Wipe a Computer of All Your Personal Data

And also recycle it once you’re done. Whether you’re selling it, trashing it, or reusing it, that old computer of yours has a bunch of extremely private data stored inside. And there’s a good chance that tossing files in the recycling bin and hitting factory reset won’t protect you. If a hacker finds the patternContinue reading “How To Wipe a Computer of All Your Personal Data”

HACKERS CONTINUE TO MOUNT ATTACKS ON WEBMIN SERVERS

Original Article by: securitynews.sonicwall.com Webmin servers have been under attack after (August) the major disclosure of remote code execution vulnerability. SonicWall Threat Research Lab continues to observe attempts to exploit this vulnerability in the Webmin server.  Webmin: With over 3 million downloads per year, Webmin is one of the world’s most popular open-source web-based applications for managing Unix-based systems. It allowsContinue reading “HACKERS CONTINUE TO MOUNT ATTACKS ON WEBMIN SERVERS”

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here’s what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Original author: Josh Fruhlinger | CSO Phishing definition Phishing is a cyber attack that uses disguised email as a weapon. The goal is toContinue reading “What is phishing? How this cyber attack works and how to prevent it”

From Homes to the Office: Revisiting Network Security in the Age of the IoT

Article originally published on September 23, 2019 by Trend Micro: The internet of things (IoT) has gone beyond the walls of the “house of the future” and is quickly finding its way into businesses, as many enterprises have come to recognize its potential in providing a myriad of solutions for their growing needs. Taking advantageContinue reading “From Homes to the Office: Revisiting Network Security in the Age of the IoT”