How to Know If Your Phone Has Been Hacked

Smartphones have revolutionized our personal and business lives. We socialize on phones, take endless photos, use them to close deals, find restaurants, organize our schedules, and deposit checks. But all that power and flexibility brings inherent risks. Protect yourself by recognizing the signs that indicate your phone has been hacked. Know the Hacker Playbook Individuals can gain access to your phone and its data in a variety of ways. Understanding their methods will help you keep bad actors out. For instance, hackers may access your phone by: Direct access – With direct access to your phone, a hacker can install…

READ MORE

Microsoft Exchange Hack – Essential Steps to Protect Your Data

On March 2, Microsoft warned of exploits that take advantage of multiple Microsoft Exchange vulnerabilities. Security experts warn that any organization running on-premises Microsoft Exchange could be at risk for the Microsoft Exchange Hack. They must take the threat seriously and follow the steps necessary to protect data assets. Hafnium Hack The Microsoft hack appears to have originated with the Hafnium organization out of China. Hence, some refer to it as the Hafnium Hack. However, experts have now identified at least ten advanced persistent threat groups using the vulnerabilities to attack thousands of servers an hour. And it appears the…

READ MORE

How to avoid a Bitcoin blackmail scam

How to avoid a Bitcoin blackmail scam “I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these chilling words are part of a new scam targeting men. Here’s how it works. Scammers have been sending letters to men, demanding payments using bitcoin in exchange for keeping quiet about alleged affairs. The letter also explains how to use bitcoin to make the payment. This is a criminal extortion attempt to separate people from…

READ MORE

The Game of Thrones Hack: What it Means For You and Your Business

Every Sunday, millions of people tune in to watch the characters on the HBO series Game of Thrones face an evolving series of threats. From poisonings and beheadings, to epic sword fights and naval battles, it seems like we’ve seen it all. Well, now HBO is dealing with serious threat of its own—and no, we’re not talking about dragon fire. The premium network suffered what appears to be a major cyber attack, with hackers threatening to leak over 1.5 terabytes of data (according to Mashable, that’s the equivalent of 303 pirated seasons of Game of Thrones). HBO isn’t the first entertainment…

READ MORE

How to Protect your Business from a FREAK Attack

A recent NSA hack by researchers reveals a new network vulnerability that puts sensitive customer and business data at risk Recently a new type of hacker threat has come to light. The NSA had their thought-to-be-secure website compromised by researchers employing a FREAK attack to demonstrate how criminals might, with minimal effort, profit from the technique by stealing passwords, personal information and financial data. Hackers, now familiar with the technique, will be looking for susceptible targets. What is a FREAK attack? FREAK stands for Factoring RSA Export Keys. It’s a way of forcing a lower level of encryption on a…

READ MORE

Home Depot or Home Town Enterprise, Hackers Threaten Any Size Business

Recent security breaches highlight increasing threats to large and small businesses alike. Proactive measures help businesses avoid becoming the “low-hanging fruit” Once again, retail customers recoil as a huge data security breach at Home Depot was recently confirmed and additional hacks at Kmart, HP, Jimmy John’s and Snapchat were announced. According to security experts, the Home Depot breach involves more stores over a longer period of time than the Target breach earlier this year. As many as 60 million customers’ credit and debit card information may have been stolen. The breach was discovered when large numbers of stolen cards entered…

READ MORE