Posts Tagged ‘Security’
Security Stop-Press : Plex Warns Users To Reset Password After Suspected Hack
Home media streaming service Plex has warned users to reset their passwords following a suspected hack that could affect up to up to half of its 30 million users. Plex has apologised and said that it has discovered how the threat actor accessed the system and is tightening security to prevent future incidents. This story…
Read MoreFeatured Article: How Can You Protect Yourself From âIdentity Theftâ?
With identity theft and the resulting identity fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, plus how to reduce the risk of having your identity stolen and used for fraud. What Are Identity Theft and Identity Fraud? Identity theft is when…
Read MoreSecurity Stop-Press : Warning Over Amazonâs Human Voice Mimicking Plans For Alexa
A Global Cybersecurity Advisor at ESET has warned that Amazonâs plans to enable the Alexa voice assistant to mimic human voices (dead or alive) could be used to launch deep fake audio attacks on some voice authentication security systems. The advice from some security experts is that, if Amazon goes ahead with voice mimicking for…
Read MoreSecurity Stop-Press : Facebook Phishing Scam
Security company PIXM has warned of a Facebook scam, active since Q4 2021, which has ensnared nearly 10 million users. The credential harvesting scam uses a fake Facebook login page. When a user logs in, the threat actor gets their credentials and can then use an automated program to send out the link to the…
Read MoreSecurity-Stop-Press : Microsoft 365 Loophole Could Allow Ransomware Attack
Proofpoint researchers have reported finding a way that attackers could use a Microsoft 365 loophole to launch ransomware attacks. The method involves using compromised SharePoint Online or OneDrive accounts to reduce the (user-configurable) setting for the number or saved versions in SharePoint Online or OneDrive. Attackers can then encrypt files in those drives so that…
Read MoreSecurity-Stop-Press : Snake Keylogger Malware Being Spread In PDF Files
Online security experts are warning people to take extra care when downloading PDF files after PDFs were recently used in campaigns to deliver Snake Keylogger malware. Snake Keylogger, which is eighth place in Check Pointâs Global Threat Index, records a userâs keystrokes and transmits the collected data to cybercriminals. The advice is to use a…
Read MoreSecurity-Stop-Press : Microsoft Office Users Warned About Word Malware Scam
Cybersecurity expert, Kevin Beaumont, has warned Microsoft Office users about a scam that uses a hole in a Microsoft Word. The scam, dubbed âFollinaâ, involves cybercriminals leveraging a Windows utility called msdt.exe to cause victims to download a malware-loaded Word file. The malware could allow attackers to run arbitrary code, install programs, change or delete…
Read MoreSecurity Stop-Press : QuickBooks Customers Targeted By Phishing Attacks
Tax software vendor Intuit has warned that QuickBooks customers are being targeted with phishing attacks that are impersonating the company and are designed to lure targets with fake account suspension warnings. The phishing emails ask targets to click on a “Complete Verification” button which re-directs them to a phishing site designed to harvest personal information…
Read MoreSecurity Stop-Press : Warning About Fake DHL Customer Support Chatbot Phishing Scam
Trustwave SpiderLabs cybersecurity researchers have warned that criminals are using fake DHL customer support chatbots to scam victims out of personally identifiable information and payment data. Victims are directed to the fake chatbots by a phishing email saying that the target has a parcel waiting with DHL, and further instructions are needed. The advice is…
Read MoreFeatured Article: Tracking What Happens To Attachments After They’re Sent
In this article, we look at how there are several risks and challenges associated with sending email attachments, how businesses can track emails, and about a new product that could allow greater visibility and control of what happens to email attachments after theyâve been sent. What Happens When Emails With Attachments Are Sent? Modern email…
Read More