As always, it is very important to understand How You Get Attacked. Here is an article on how to avoid phishing. Story on PCMag
Category: Cybersecurity
Software supply chains at risk: The account takeover threat
Another entry detailing why it is so important to protect your important accounts. Story on TechRepublic
5 Ways to Increase Your Online Security in 10 Minutes
Basic protection may be just Basic – but for most people, Basic is better than NOTHING. Story on PCMag
The Internet of Things is still very messy. That could be about to change
The Internet of Things continues to be the Technology Wild Wild West. But help may be coming. Story on ZDNet
This sneaky fraud attack looks like an email forwarded by your boss
Another new approach. You need to always be thinking… Story on ZDNet
New Chaos malware spreads over multiple architectures
New Malware that attacks multiple architectures. Story on TechRepublic
How ransomware gangs operate like legitimate businesses
Most people assume that they are not a Target – No one is after me! Unfortunately, Not-Me is no protection against cybercrime. Most Ransomware gangs are not looking for targets, EVERYONE is a target in their business. Story on TechRepublic
Malware Found Hiding in a Windows Logo
Cybercriminals have no shortage of creativity. An attack hiding in a Windows Logo… Story on PCMag
Wrong Numbers, Fake Invoices, and Catfishing: How to Avoid the Top Internet Scams
It is very important to understand How You Get Attacked. This PCMag article covers in general how to recognize and avoid the Top Internet Scams. Story on PCMag
New Exchange Server zero-day vulnerabilities are being used in cyberattacks: Protect your network now
Protect yourself from the latest Exchange zero-day problems. Story on ZDNet