now browsing by tag


#childsafety | ‘Little Pocket’ On LI Among Virus Clusters Concerning Cuomo | #parenting | #parenting | #kids

LONG ISLAND, NY — Gov. Andrew Cuomo this week warned that clusters of coronavirus cases are popping up across the state, including on Long Island, in New York City and […] View full post on National Cyber Security

After Mamata Banerjee’s Political Epidemic Swipe, BJP’s Political Virus Reply | #students | #parents | #parenting | #parenting | #kids

Mamata Banerjee targetted the centre over holding JEE and NEET amid coronavirus (File) Kolkata: West Bengal Chief Minister Mamata Banerjee on Friday asked students to help defeat the BJP in […] View full post on National Cyber Security

Health Department Warns Parents of the Virus’ Impact on Children | #covid19 | #kids | #childern | #parenting | #parenting | #kids

The L.A. County Department of Public Health today has confirmed 2,885 new COVID-19 infections and 62 deaths related to the virus. To date, the Health Department has identified 150,319 COVID-19 […] View full post on National Cyber Security

#cyberfraud | #cybercriminals | UAE warns against resurgence of Emotet virus and other cyber scams

Source: National Cyber Security – Produced By Gregory Evans

UAE residents have been warned to be on their guard following a recent spike in cyber scams and the resurgence of a virus designed to steal victims’ private financial information.

The country’s Telecommunications Regulatory Authority said it had seen a new outbreak of the ‘Emotet’ virus, which if downloaded can allow personal details to be stolen remotely, worldwide. It also warned against fraud carried out through Snapchat links.

Meanwhile, another scam involving messages sent by WhatsApp or text message, in which criminals pose as bank representatives and claim a user’s ATM card had been blocked, has become increasingly “widespread” recently, authorities said.

Malicious cyberattacks were increasing with the perpetrators’ motives ranging from stealing money and property to “destroying large organisations and creating chaos in many countries of the world,” according to Hamad Obaid Al Mansouri, the TRA Director General.

“The UAE prioritised the happiness of its nation as a main objective of its future plans and visions, and this happiness can only be achieved by safeguarding the peoples’ property and preserving security,” he said. “We must make every effort to protect our good nation from shady intruders.”

Mr Al Mansouri vowed that the National Computer Emergency Response Team (aeCERT), set up in 2008, would continue to fight cybercrime on residents’ behalf.

The body, which is part of the TRA, “works around the clock to spread awareness among different groups of society on how to deal with viruses and hacking attempts,” he said.

It also makes recommendations around updating legislation and spread expertise in cyber security among businesses.

Authorities said people should be particularly vigilant around clicking on links designed to appear harmless but which could lead to malware being installed on computers. ‘Filters’ sent through Snapchat could also include viruses, the TRA said.

People have also been urged to ensure they have the latest software and security patches installed on their mobile phones by ensuring iOS and Android operating systems are up to date.

The Emotet virus, which the TRA is particularly concerned about, first emerged in 2014. Later versions of the malware was able to access contacts on an infected computer and send itself to them by hijacking email accounts. It can be missed by some antivirus software.

Emails containing the virus may try to persuade users to click the malicious files by disguising correspondence as coming from a reputable company and using language about “your invoice,” “payment details,” or possibly an upcoming shipment from well-known parcel companies.

Updated: December 26, 2019 04:55 PM

Source link

The post #cyberfraud | #cybercriminals | UAE warns against resurgence of Emotet virus and other cyber scams appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Book Review: Virus Bomb – Security Boulevard

Source: National Cyber Security – Produced By Gregory Evans

Imagine this:

“Jerry Barkley is a Minnesota IT contractor just trying to earn a living for his family. He’s no superhero. He never worked for the government. He knows nothing about international espionage. Nobody believes his warnings when he uncovers a plot to launch the largest cyberattack in history. Somebody is gathering data to plan a series of bombings and a biological attack while trying to pin blame on a terrorist group. Oh, and the FBI thinks Jerry is part of it.

Hundreds are already dead. Thousands more could die, first from Ebola and then potentially from a war with the wrong enemy. If he doesn’t act, who will? Up against willful ignorance, a hostile law-enforcement bureaucracy, and armed with nothing but IT skills and quick wits, Jerry must leave his keyboard comfort one and go face-to-face with elite foreign agents and shut the attack down.”

This intro is a (slightly edited) description of the fiction novel: Virus Bomb by D. Greg Scott. The book was released this past summer.

Greg Scott is a veteran of the tumultuous IT industry. Greg graduated from Wabash College in Crawfordsville, Indiana with a double major of math and speech and earned an MBA from the University of St. Thomas in Minneapolis. He started Scott Consulting and Infrasupport Corporation with a focus on infrastructure and security. He currently works for an enterprise software company and holds several IT industry certifications, including a CISSP certification. Greg lives in the Minneapolis/St. Paul metro area with his wife, daughter, and two grandchildren.

Very Brief Book Excerpt

“Hey, Dan.” Jerry said into his cell phone. The Minnesota midafternoon sun shone through his basement window. “I just finished talking to the antivirus team in England. They disassembled the code from Leah’s workstation. And all I can say (Read more…)

Source link

The post #cybersecurity | #hackerspace |<p> Book Review: Virus Bomb – Security Boulevard <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Zeus Virus AKA Zbot – Malware of the Month, November 2019

Source: National Cyber Security – Produced By Gregory Evans

When you’re named after the ancient Greek king of the gods, you’ve got a reputation to live up to. And our malware of the month — Zeus Virus, or commonly known as Zbot, Zeus Trojan, or simply Zeus Malware – doesn’t fall short. Over the past few months, we’ve profiled a few truly destructive malware types such as Kovter, Emotet, and Trickbot. Zeus though takes the cake, by cobbling together all of the crafty attributes in these malware types — stealthiness, undetectability and the ability to resiliently evolve.

What is the Zeus Virus, or Zbot?

Zeus Virus is a Trojan malware package that particularly targets Microsoft Windows. Trojan types of malware mislead users of its true intent, much like its namesake horse. Zeus made a king’s entry in 2007  attacking both top corporate houses and US government institutions with one swoop. 

Since then, it has become one of the most damaging botnets in the world, thus popularizing the Zbot moniker. Amongst its notable attacks was a $70 million heist from hacked bank accounts causing the FBI to intervene. Even more worrisome is that it has reproduced hundreds of mal-variants that are based on its code. Even though cybersecurity experts heaved a sigh of relief when its creator purportedly “retired,” the Zeus malware mafia lives on.

How does Zeus work?

Zeus’ main vectors are mail spam, malicious social engineering and by inserting itself into legitimate product downloads, also known as drive-by downloads.

Once in the victim’s machine, Zeus Virus creates a hidden “backdoor” on the computer. Backdoor malware is especially dangerous as it allows the attacker to have full access and complete control over the machine, and consequently an entry-point into the company’s network. Zeus then proceeds to steal the victim’s data including personal details, application logins, and banking information. Or, its avatar Zbot inducts infected machines into a botnet — a network of other compromised machines controlled by a master hacker. This can lead to devastating wide-scale attacks that infect the entire network of the organization.

Tips to protect your organization from Zeus Malware

  • Strengthen Authentication: Most malware attacks are the result of compromised and weak credentials. Two-Factor Authentication or Multi-Factor Authentication (MFA) are excellent gate-keepers, that prevent unauthorized access of applications. Make sure all your applications, including third-party ones, support and implement it.
  • Create Anti-Phishing Policies – Office 365 includes built-in features that protect your users from phishing attacks. Take advantage of the threat management tools in Office 365 to set up anti-phishing policies and increase your protection status. You can even create custom policies for specific users, groups, or domains. 
  • Cybersecurity Training: Phishing and social engineering are Zeus’ key vectors, as is the case with most types of malware. Hence, an essential malware prevention best practice is to conduct regular org-wide cybersecurity training. Educate colleagues about the basics of good security hygiene, such as checking the sender’s email ID, and avoiding downloading attachments or clicking URLs from unknown sources and alerting support about emails with suspicious content.
  • The Usual Protectors: Check that your anti-virus solutions are auto-updated, and that you have robust firewalls and network monitoring tools in place.

Malware attacks are on the rise. Ensure that your business, colleagues or customers are not held ransom to them, by backing up your data securely. Spanning Backup provides top-rated SaaS backup and recovery solutions for Office 365, G Suite, and Salesforce. With Spanning’s accurate, real-time data backup that you can drastically limit the damage of malware attacks, and ensure business continuity by quickly recovering lost or corrupted data with a few clicks.

Learn How Spanning Protects Office 365

Source link

The post #cybersecurity | #hackerspace |<p> Zeus Virus AKA Zbot – Malware of the Month, November 2019 <p> appeared first on National Cyber Security.

View full post on National Cyber Security

2,000 #computers were #shut down due to #SamSam virus #attack to #Colorado Department of #Transportation

Source: National Cyber Security News

On Wednesday morning the workday in Colorado Department of Transportation (CDOT) was disturbed. The institution went back to good old days when computers were not existing due to SamSam ransomware virus attack.

On February 22, the file-encrypting virus hit CDOT’s computers, encrypted files and demanded to pay the ransom in Bitcoins. More than 2,000 computers were shut down to stop and investigate the attack.

According to the CDOT spokeswoman, the version of SamSam ransomware hit only Windows OS computers even though they were secured by McAfee antivirus. However, CDOT and security software providers are working on virus elimination.

Fortunately, Colorado Department of Transportation has all data backed up. Therefore, they are not going to pay the ransom and crooks attempts to blackmail the institution did not succeed.

Meanwhile, employees are forbidden from accessing the Internet until the problem is solved. Ransomware did not affect any critical services, such as cameras, alerts on traffics or variable message boards.

Authors of SamSam ransomware already received money from victims in 2018
SamSam ransomware is known for a while. Numerous versions of malware hit hospitals and other institutions last year. Colorado Department of Transportation is not the first organization that was in the target eye of the ransomware creators this year too.

Read More….


View full post on National Cyber Security Ventures

Billings cyber security businesses getting busier in the wake of global WannaCry virus

A cyber attack that spread ransomware across the globe managed to disable computer networks and strike panic in private businesses and government agencies. But by one measure, the WannaCry attack was a dud. The perpetrators of the virus — some are pointing fingers at hackers in North Korea — demanded that their victims pay ransom […] View full post on National Cyber Security Ventures

Held hostage by hackers – latest computer virus infecting the valley

Source: National Cyber Security – Produced By Gregory Evans

Held hostage by hackers – latest computer virus infecting the valley

GRAND FORKS, ND (WDAZ-TV) – Held hostage by hackers – local businesses, even some residents, are under attack, but you can protect your home or business from ransomware.
A manager of a business in our area says one of his

The post Held hostage by hackers – latest computer virus infecting the valley appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Computer hackers target Saudi Arabia in series of virus attacks


Source: National Cyber Security – Produced By Gregory Evans

Computer hackers target Saudi Arabia in series of virus attacks

Hackers have reportedly conducted a series of attacks on Saudi Arabia, targeting the agency running the country’s airports and hitting five additional targets.
Bloomberg reported on Thursday that the attacks took place over the last two weeks, citing two people

The post Computer hackers target Saudi Arabia in series of virus attacks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures