Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for So, your account was ...

 Tips

Finding out one of your accounts has been hacked can be pretty stressful — more so if it’s one you actively use to chat with friends, make purchases, or store files. Instead of reacting emotionally, it’s important at this early stage to focus on minimizing consequences. Rescue your money and data,   show more ...

protect your friends from scammers, regain control of your account — generally, reverse or at least halt the damage. We will tell you what steps to take. If you can’t sign in at all In many cases, users first learn they’ve been hacked by suddenly becoming unable to log in to an account. That’s because in many cases, the first thing hackers do is change the password, locking out the victim and gaining complete control over the stolen account. Don’t panic: You can still do plenty. Take a deep breath. It is important to do everything quickly and prioritize your actions. Try resetting your password. If you act quickly enough, the attackers may not yet have had time to disassociate your e-mail from your account. Warn as many people as possible that your account was hacked. Get in touch with friends and loved ones. Post a message on social networks. If people know your account was hacked, they will be less likely to fall for the scammers’ tricks if attackers start sending requests in your name, for example telling everyone in your address book that you have an emergency and desperately need cash. Call your bank or other financial service if the scammers hacked an account in a payment system or one with an associated credit card. Scan your computer using antivirus software to make sure that it is free of any malware that could be used to steal account passwords. Make a list of the most important services associated with your hacked account. Recall all of the services that you log in to using this account as well as any that send password reset e-mails to this account. Try logging in to those services and unlinking them from the hacked account. Change the passwords for the associated accounts as well as for any services for which you used the same password as for the hacked account. (It is also worth changing the security questions for other services if they are the same ones you used for the hacked account. Better yet, you should also set up two-factor authentication.) Contact account service support and try to restore access to the affected account. See the instructions for Facebook, Google, Instagram, and Twitter. What to do if you receive notification about suspicious activity Many online services warn users if their accounts are used to perform certain significant actions. The actions may include changing your password, linking a new phone or e-mail address to the account, and logging in from a new device or location. If you didn’t perform those actions and still received such a message, then you should be concerned. Try to log in to your account, but not using any links in the notification. Phishing messages seeking login credentials can look a lot like official account notifications. The best practice is to manually enter the address in your browser or open the app. Check your login history if the account allows it, and if you see any unfamiliar devices or places on the list, immediately log out all other users. Check all of your account details including e-mail address, phone number, and security questions. Change your password. Make sure that it is strong and substantially different from the old one. If you are afraid that you will forget your new password, use a password manager to safely store all of your passwords. Change the password in all accounts where you used the compromised one, as well as in accounts associated with the compromised login (for example, accounts at all online stores where you logged in using a hacked social network login). What to do if you receive a ransom letter from hackers Sometimes, attackers get in touch, claiming to have gotten into your account, infected your computer with terrible malware, recorded a compromising video using your webcam, copied your messages, or the like. The malefactors typically threaten to publish the collected data if you don’t pay a ransom. In fact, it is unlikely that anyone hacked your device. Scammers have been known to send extortion letters in all sorts of circumstances, including to the addresses in some spam database. If you want to play it safe, go ahead and change the password for the account that was allegedly hacked — it’s not a bad thing to do that every so often anyway. Again, if you are afraid that you will forget your new password, install Kaspersky Password Manager, which will remember everything for you. How to avoid falling victim to hackers Of course, it’s best to keep scammers out of your accounts to begin with. Therefore, even if you are not the victim of a hack, make sure your accounts are protected: Use strong and unique passwords; Activate two-factor authentication; Install a reliable protective solution on all of your devices. It is important to choose a package that will not only catch malware, but also warn you if the credentials for any service that you use have been leaked.

image for WFH for the Long Hau ...

 Home + Mobile

Reading Time: ~ 3 min. Cyber resilience is being put to the test during the coronavirus pandemic. As more and more users work from home, it’s becoming increasingly difficult for IT teams to ensure uniform cyber security on home devices and networks that they don’t own or control. At the same time, cybercriminals   show more ...

are using the pandemic to launch more deceptive attacks. In this post, we’ll break down a few steps you can take to add resilience to your home network, so you don’t have to sacrifice security for convenience during the global pandemic. We cover all of these tips and more in our Work From Home Playbook. The secure tunnel We lose a measure of security the minute we step outside the protective shell of our corporate network. The average home network is significantly less secure than corporate networks. This leaves remote workers more vulnerable to attacks anytime they’re not connected to the corporate network. Luckily, you can easily improve your at-home security by using a virtual private network (VPN). With a VPN, you can establish a secure tunnel between your home network and your corporate environment, making your home connection more immune to outsider attacks. A VPN extends your home network – or connection from the local coffee shop – across a public network, allowing you to interact with your corporate system as if you were connected directly to it. This allows applications to operate securely and encryption to be enabled within the connection, ultimately privatizing any data being shared or input. Handshake hygiene A clean handshake is healthier in the physical world. And it’s the same with the digital handshake between your home devices and your corporate network. Anytime someone from outside the network attempts to log on, there’s a risk the person isn’t who they say they are. Login credentials are stolen all the time. In many scenarios, all it takes is a username and password to gain access to the company network. Once inside, cyberthieves can unload malicious payloads or find additional user credentials to launch even more pernicious attacks. But by adding just one extra layer of security in the form of an additional checkpoint, it’s possible to thwart most attacks that rely on only a username and password. That’s why multi-factor authentication (MFA) has become the go-to method for adding extra verification steps to confirm that the person logging on is truly who they say they are. With MFA, the user verifies their identity using knowledge only they have, like a password or answers to challenge questions. As an additional verification step, the user supplies an item, like a YubiKey or a one-time password sent to a mobile device. Lastly is an inherited characteristic unique to who the person, such as a fingerprint, retina scan, or voice recognition. In today’s highly regulated business environment, most businesses make MFA mandatory for employees logging in from outside the network. First, second and third lines of defense Cybercriminals have a full quiver of options when it comes to launching attacks. But the good news is that there are also multiple solutions for defending home systems against them. The best way to secure the home network is to use a multi-layered cyber resilience strategy, also known as defense in depth. This approach uses multiple layers of security to protect home devices and the networks they’re connected to. Here’s what that looks like: Backup – Backup with point-in-time restore gives you multiple recovery points to choose from. It ensures you can roll back to a prior state before the ransomware virus began corrupting the system. Advanced threat intelligence – Premium antivirus protection is still the first line of defense. And antivirus that is backed by advanced threat intelligence, identification and mitigation is essential for preventing known threats from penetrating your system. Patch and update applications – Cybercriminals are experts at identifying and exploiting security vulnerabilities. Failing to install necessary security patches and update to the latest version of applications and operating systems can leave your devices exposed to an attack. Learn more Cyber resilience while working from home is every bit as critical as working on-site. For more tips on how to add resilience to your home environment, and how to prepare your space for working from home long-term, download the Work from Home Playbook. The post WFH for the Long Haul? These Tips Will Help You Create a Cyber Resilient Home Network appeared first on Webroot Blog.

 Feed

Ubuntu Security Notice 4464-1 - It was discovered that GNOME Shell incorrectly handled the login screen password dialog. Sensitive information could possibly be exposed during user logout.

 Feed

ClamOne is an open source Linux front-end to the ClamAV Antivirus Engine. A basic graphical user interface, designed for a Desktop environment, to provide instant feedback when threats are detected on the local system. Features include configuring the clamd daemon directly from the GUI, indication of threats via   show more ...

visual cues as well as notifications, monitoring and updating the virus definitions, monitoring various clam-related event logs and messages, quarantining of detected threats, and visual graphing of antivirus activity.

 Feed

Ubuntu Security Notice 4463-1 - It was discovered that the bcache subsystem in the Linux kernel did not properly release a lock in some error conditions. A local attacker could possibly use this to cause a denial of service. Kyungtae Kim discovered that the USB testing driver in the Linux kernel did not properly   show more ...

deallocate memory on disconnect events. A physically proximate attacker could use this to cause a denial of service. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2020-3475-01 - The Berkeley Internet Name Domain is an implementation of the Domain Name System protocols. BIND includes a DNS server ; a resolver library ; and tools for verifying that the DNS server is operating correctly.

 Feed

In this paper, the author presents ELKM, a Linux tool that provides a mechanism to securely transport and load encrypted Loadable Kernel Modules (LKM). The aim is to protect kernel-based rootkits and implants against observation by Endpoint Detection and Response (EDR) software and to neutralize the effects of recovery by disk forensics tooling. The tool as well as the whitepaper is provided in this archive.

 Feed

Ubuntu Security Notice 4461-1 - Dominik Penner discovered that Ark did not properly sanitize zip archive files before performing extraction. An attacker could use this to construct a malicious zip archive that, when opened, would create files outside the extraction directory.

 Feed

This Metasploit module exploits a PHP code injection vulnerability in D-Link Central WiFi Manager CWM(100) versions below v1.03R0100_BETA6. The vulnerability exists in the username cookie, which is passed to eval() without being sanitized. Dangerous functions are not disabled by default, which makes it possible to get code execution on the target.

 Feed

Jenkins—a popular open-source automation server software—published an advisory on Monday concerning a critical vulnerability in the Jetty web server that could result in memory corruption and cause confidential information to be disclosed. Tracked as CVE-2019-17638, the flaw has a CVSS rating of 9.4 and impacts Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521—a full-featured tool

2020-08
SAT
SUN
MON
TUE
WED
THU
FRI
AugustSeptemberOctober