DDoS attack that knocked Telegram secure messaging service offline linked to Hong Kong protests

| June 13, 2019

article image
An attack which targeted users of the Telegram app on Wednesday might be linked to protests in Hong Kong that turned violent. That’s one of the theories in circulation, after a distributed denial-of-service (DDoS) attack disrupted legitimate access to the Telegram secure messaging app by swamping it with “garbage requests.” Pitched battles broke out in Hong Kong on Wednesday between police and protestors over proposals to allow the extradition of suspects to mainland China. Smartphone messaging apps like Telegram and the less well-known FireChat – which creates a mesh network using Bluetooth and peer-to-peer Wi-Fi, allowing users to communicate even when they don’t have a cellular signal or internet access – are currently amongst the most popular downloads in Hong Kong’s iOS app store and were being widely used by protesters. Many of those involved in the demonstrations, fearful of potential repercussions if facial recognition technology was deployed by law enforcement, covered their faces with masks and queued to buy public transport tickets rather than using Oyster cards that might be tracked.

Spotlight

Cyber Forza

Cyber Forza separates itself by offering next generation CISS - Cyber Intelligent Security Software products with Integration of AI. We Identify, Detect and Protect your entire organization from A-Z or Outside threat to the deepest internal endpoint. Cyber Forza products have been developed, deployed and proven in defense & commercial sectors for several years. Cyber Forza core operating system "Forza OS" is built upon a robust threat management architecture. We differentiate ourselves by creating innovative and intelligent cyber security products.

OTHER ARTICLES

COVID-19 and Amygdala Hijacking in Cyber Security Scams

Article | April 9, 2020

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally take. Recent attacks have been sending out mandatory meeting invites that ask you to log in to accounts. Others have been receiving emails to put themselves on a waiting list for a vaccine or treatment. The heightened emotions we experience when we see emails, or messages like this, may prompt us to give personal information out more willingly than we usually would. Security awareness takes a back seat as emotion takes over. It’s known as amygdala hijacking. Why does this happen to us? The amygdala is a small part of the brain that is largely responsible for generating emotional responses. An amygdala hijack is when something generates an overwhelming and immediate emotional response.Many common cyber security scams use amygdala hijacking to their benefit. We see this used often in phishing, vishing, SMShing, and impersonation attacks. Chris Hadnagy of Social-Engineer, LLC did a case study on amygdala hijacking in social engineering.

Read More
DATA SECURITY

What Is Mac Malware, How It Penetrates Your Device, and How to Get Rid of It

Article | April 9, 2020

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I may say that there are plenty of nasty malware types like adware that open new tabs in your browser, redirect you to irrelevant pages and show numerous popups. Yes, these are not real viruses. Adware like Search Marquis cannot clone itself and infect other connected devices. It cannot encrypt your files or cause any other harm. Its activity is related only to web redirects and excessive advertising. At the same time, who knows which rogue websites adware may land you on next time. It may happen that you end up on a phishing website where cyber crooks harvest personal information that leads to identity theft. Fake antiviruses I strongly recommend removing all adware that penetrated your device. But there is a problem here. If you want to get rid of Mac adware, you cannot quickly find a solution. If you go to google and search there how to get rid of Mac malware, you will see that all top results offer you to buy and install some shady software. In reality, these Mac antiviruses do nothing, as we know that the Apple ecosystem does not allow apps to access other apps' data. No antivirus can really scan and check your files. How to remove Mac malware Solution 1: If your system is infected with adware and you do not know how to get rid of it, you may try to call Apple and ask what to do. You can find their phone number here: support.apple.com/en-gb/HT201232#us-ca. Solution 2: Another option is to try your luck on Apple communities. Thousands of tech enthusiasts help uses with their problems there. Here is a sample thread: discussions.apple.com/thread/8226644. Solution 3: There are other options too. Apple operating systems are not very difficult to use, and any person can remove adware manually by going through step-by-step guides posted on numerous malware removal websites. Here is a guide by BitAdvisors.com on how to remove Search Marquis malware. Most rogue software works by exploiting bugs and vulnerabilities in your computer's operating system. And macOS has its own bugs too. To fix these vulnerabilities, Apple periodically releases operating system updates. To date, macOS has not proved attractive enough for cybercriminals and evil developers to flood it with malware. Protection tips To stays away from any surprises, it is recommended to update your OS as well as all apps installed regularly. You should never install apps from unofficial app stores not controlled by Apple. One of the ways for adware to penetrate your Mac computer is through bundled installs. You download and install a very useful app that is often free, but in reality, you get several apps. People never read user agreements written in small print. There it can be noted that you agree to install additional tools and provide some rights to them. Whenever you install something, be careful and read user agreements, and do not miss additional unnecessary software. Do not install any software without urgent necessity. Any additional software widens the attack surface. To be able to do bad things, current Mac malware requires users to perform some actions – grant rights. So, be careful with allowing any app to access your data, change settings, etc. One more wise move is to make backups. iCloud or ordinary flash drives will help you not lose your data in case of a system glitch or malware attack. Final advice - do use VPNs. Your connection will be encrypted, and attackers will not be able to find where you are actually located or what data your traffic consists of.

Read More

Guest Blog: Cyber security guidance for remote working

Article | April 9, 2020

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Centre) issuing warnings of such activity on a daily basis, it’s important that we all work to protect our businesses from the damage of cybercrime. As many of us move to working from home, the opportunity for cyber attacks only increases, so it’s vital that we work together with our IT colleagues to adopt good cyber health practices. If you are working from home, you should only be using a VPN (Virtual Private Network) or a secure home network with strong end-to-end encryption; e.g. Office 365 SSL session. Don’t be tempted to use public wifi, as hackers can position themselves between you and the access point.

Read More

Cybersecurity Marketing Tips for 2022

Article | April 9, 2020

Cybersecurity is growing as a market, and it has exploded since the pandemic started. This is because the companies incorporated remote work culture like never before. As a result, cyber threats and challenges are increasing. Cyber threats can jeopardize any business. Thus, the demand for cybersecurity products is increasing. However, the providers struggle to meet the increasing demand for cybersecurity services, and the competition is high. Whatever your business, effective marketing makes you stand out from the crowd. As technology has transformed, various online platforms are being used for effective marketing of all the products. As a result, most leads and sales are coming through online channels today regardless of your business. Thus, having an effective online marketing strategy defines the future of you and your business. So is in the case of cybersecurity products and marketing. Therefore, you should have a clear-cut cybersecurity digital marketing strategy to stand out from the crowd and reach your target audience at the right time with the right message. Are you a cybersecurity software service provider? Are you struggling with cybersecurity marketing? Read further to know the possible challenges of cybersecurity marketing and how to overcome them proactively. Cybersecurity Marketing- Challenges Like every other business, cybersecurity marketing, too, face many challenges. This is because the technology has developed and the competition is high. In addition, educating potential customers about the need for cybersecurity and its effectiveness is a tiresome job. Some of the significant challenges faced by cybersecurity marketers can be the following: Educating Potential Clients Most business people are not aware of the need for cybersecurity today. This is because they are ignorant of it. They will only know its importance when their business is jeopadized due to malware or an incident of phishing. Thus, intense, informative, convincing, and educational content creation is another challenging part of cybersecurity digital marketing. Building Trust, Credibility, and Trustworthiness Trust and credibility matter. Whatever cybersecurity products they use, the cybersecurity professionals know that no cybersecurity software is a hundred percentages safe. Therefore, it is a challenge to stand out from the crowd and get the trust of your potential clients as many vendors are claiming they have the best product in the world. Due to these reasons, building up trust, credibility, and trustworthiness is a hard job for cybersecurity marketers. Finding and Reaching out to your Real Target Audience ‘One-size-fits-all’ policy does not work with cybersecurity businesses. Your product can be applied to particular clients only. Thus, advertising it for the benefit of all is a foolish thing to do in cybersecurity marketing. All cybersecurity professionals know it. Therefore, finding the specific target audience for your product is a challenge. However, having a proactive cybersecurity marketing strategy and knowing the dos and don’ts will undoubtedly make you stand out from the crowd. In addition, it would enable you to build brand image and sell your products to your actual target audience, who need your products to run their business smoothly. Cybersecurity Marketing- Tips for 2022 Even if you have all the facilities and tools, cybersecurity product marketing is not that easy. Your success lies where you proactively solve the challenges you face in your marketing process. Let us look into some of the ways and tips to overcome the challenges you may face in the cybersecurity marketing process. Cybersecurity Customer Testimonials Nothing matters much more than credibility, trustworthiness, and reliability in the cybersecurity business. Customer experiences and feedback have much value in any business. Customers always want to hear from their fellow customers. Thus, testimonials are crucial in any marketing strategy. You can make use of testimonials in any form, such as written, videos, or podcasts. You can use these testimonials from your clients as a great resource to display the value of your products. So, get feedback from your clients tactically and even make case studies explaining how your product solved a specific issue faced by one of your clients. In most cases, customers may not be ready to provide their feedback for public use due to fear of a breach. In that case, you may have to find out creative ways to showcase customers' success stories and feedback without naming the names. Include Interactive Elements The modern audience needs interactive sessions and inspiring experiences everywhere. They hate the old school of marketing. Therefore, it is time to shift to virtual tradeshows and webinars. Breaking the traditional rules of marketing and digitally engaging the audience is the need of the hour. According to Matthew Fisch, a cybersecurity consultant, and SVP sales, If I want to sell into the banking or financial vertical, for example, I find events that they all go to, and I get to know them, listen to them, and then build a real relationship. “Then, when the topic of security comes up, I act as an advisor to help them build business solutions, whether it is with my company or recommending products and services that I am familiar with from being immersed in the industry. This builds trust, and you can bet when they are ready to buy, I’m on their shortlist. Apart from webinars and virtual tradeshows, you can also have polls, surveys, games, and breakout sessions as part of your cybersecurity marketing process. Again, this will capture your audience's attention, and you get an excellent opportunity to learn more about those attendees. Avoid False Information Remember, as a B2B Cybersecurity marketing professional, you are dealing with cyber professionals. Thus, focus on fact-based marketing. It is very critical that all your content should be fact-based and accurate. Why? Cyber professionals are aware that bad actors cleverly use misinformation to lure people to get personal information. Therefore, if your collaterals and brand messaging are not accurate, they may think you are one among them. It affects all your efforts and ends up in gathering a total negative brand image. Summing up Along with these, you may have to focus on many other things to be noticed by your targeted audience. However, the tips mentioned above will surely get you clients and build brand image by solving many of the cybersecurity marketing challenges faced by marketers today. Frequently Asked Questions What are the major cybersecurity marketing challenges Cybersecurity marketing faces many challenges today. Some of them can be educating the clients regarding the necessity of cybersecurity, generating relevant content, and reaching out to a specific audience. What are the effective cybersecurity marketing tactics Cybersecurity marketers can have unique marketing techniques according to their line products and the nature of the audience. However, webinars, email marketing, content marketing, and social media marketing will quickly help you reach out to your customer. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What are the major cyber security marketing challenges", "acceptedAnswer": { "@type": "Answer", "text": "Cyber security marketing faces many challenges today. Some of them can be educating the clients regarding the necessity of cyber security, generating relevant content, and reaching out to a specific audience." } },{ "@type": "Question", "name": "What are the effective cyber security marketing tactics", "acceptedAnswer": { "@type": "Answer", "text": "Cyber security marketers can have unique marketing techniques according to their line products and the nature of the audience. However, webinars, email marketing, content marketing, and social media marketing will quickly help you reach out to your customer." } }] }

Read More

Spotlight

Cyber Forza

Cyber Forza separates itself by offering next generation CISS - Cyber Intelligent Security Software products with Integration of AI. We Identify, Detect and Protect your entire organization from A-Z or Outside threat to the deepest internal endpoint. Cyber Forza products have been developed, deployed and proven in defense & commercial sectors for several years. Cyber Forza core operating system "Forza OS" is built upon a robust threat management architecture. We differentiate ourselves by creating innovative and intelligent cyber security products.

Events