Even the “Smart Ones” Fall for Phishing

| August 4, 2017

article image
It’s easy to believe that phishing only happens to people who aren’t smart enough to detect it. This simply isn’t true. As the tech-savvy developers at software company a9t9 have indicated in their statement[1] about a phishing incident last week, even smart developers can be fooled with a phish. As reported by Tripwire, a Chrome plugin developer fell for a phishing attack that allowed the threat actor to take control of a9t9’s account in the Chrome Store.  This means that the Copyfish plugin built by a9t9 was no longer under its control.

Spotlight

PC Pitstop

PC Pitstop was founded in November 1999 by Rob Cheng and Dave Methvin with the sole purpose of creating a better way to diagnose common computer problems. Prior to creating PC Pitstop, Rob Cheng was a Senior Vice President at Gateway Computers responsible for Gateway's Consumer business worldwide including profit and loss responsibility.

OTHER ARTICLES

COVID-19 and Amygdala Hijacking in Cyber Security Scams

Article | April 9, 2020

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally take. Recent attacks have been sending out mandatory meeting invites that ask you to log in to accounts. Others have been receiving emails to put themselves on a waiting list for a vaccine or treatment. The heightened emotions we experience when we see emails, or messages like this, may prompt us to give personal information out more willingly than we usually would. Security awareness takes a back seat as emotion takes over. It’s known as amygdala hijacking. Why does this happen to us? The amygdala is a small part of the brain that is largely responsible for generating emotional responses. An amygdala hijack is when something generates an overwhelming and immediate emotional response.Many common cyber security scams use amygdala hijacking to their benefit. We see this used often in phishing, vishing, SMShing, and impersonation attacks. Chris Hadnagy of Social-Engineer, LLC did a case study on amygdala hijacking in social engineering.

Read More

Is the CEH v11 Course Worthwhile to Pursue After Windows 11 Update?

Article | September 13, 2021

If you are finding it confusing to decide whether to pursue the CEH v11 course now after the Windows 11 update, then you have certainly landed on the right page. We are here to make things clear to you so that you can make your decision without any hassle. When it comes to Certified Ethical Hacking, it is considered to be one of the most popular testing certifications at present in the industry. It is highly popular because it assists many with complete know-how of the skills that are required for the purpose of white hat hacking. The certified professionals are able to anticipate any kind of cybercrime from before and respond to it proficiently to avert any kind of business damage. In the time of the pandemic, many business organizations have to move to digital platforms to reach their customers without lockdown troubles. This is the reason why investment in the domain of cybersecurity has also gained a wave. Businesses have realized what the value of having their infrastructure cyber resilient is. This shows why the opportunities for skilled experts in the cybersecurity domain are never going to end in the coming future, and pursuing the course of CEH v11 is a great move to follow. To make things more convincing, we are here to help you with the importance the course of Certified Ethical Hacking brings into play and how you must choose the right career path in the respective field. Let’s get started. Ethical Hacking: What It Is To The World? When it comes to ethical hacking, it is acknowledged as the procedure of networks, applications, or smart devices to assess any kind of vulnerabilities if available. This type of assessment assists in reacting quickly and taking the right measures to enhance the cybersecurity of the entire infrastructure. A certified ethical hacker is basically an expert who understands the different vulnerabilities in the system and gets them fixed without any delay. This is done by following the ethical approach so that there is no such problem repeated again in the future. What do You get To Learn From CEH v11 in 2021? With the CEH v11 course, you get to learn 24 exceptional challenges in 4 different levels that include 18 attacking vectors. You get to know about various emerging attackers that include targeted ransomware, File-less malware, API threats, and more. In this course, you also get a complete understanding of different from enumerating techniques that include Telnet, NFS, SMB, IPV6, FTP, and BGP. This course also covers Malware reverse engineering, so you get a complete understanding of Dynamic and static malware assessment. Cloud computing is another prime concept that you get covered in this course, where you learn about Docker, Container Technology, Serverless computing, Kubernetes, Cloud Hacking procedures. CEH v11 also covers a proper understanding of Hacking web applications that includes web shell concepts, Web API. Webhooks, Web API security, and hacking. You also get to learn more about WPA3 Encryption and cracking. It also covers operation technology, side-channel attacks, HMI-based attacks, and more. Why is CEH An Ideal Career Option? Ethical hacking is possessing five phases of different procedures with every single process, including different actions that block any kind of vulnerabilities. With CEH v11 certification, you get a complete understanding of all these phases. These phases are basically divided in the form of network assessment, testing, and various other risk analysis procedures. As the world of technology is growing significantly, so is the risk of cyber-crime. This is the reason why businesses are looking for ethical hacking specialists who can assist them remain protected from all the potential risks. As the dependency on data science is growing across all industries, it is important that we protect the information and digital assets in the best possible way. There is no doubt that hacking is a heinous act, and almost all businesses are aware of the risks associated with it. To get protected from these risks, organizations around the world are in search of professional, ethical hackers who ensure that there is no vulnerability outside their doors. This is why the opportunities in the domain of ethical hacking have increased in the last few years, and there is no reason why you can’t say that pursuing CEH v11 is an ideal career option. Posts Up For Grabs After CEH v11 Course Anyone who is interested in developing their career in ethical hacking, including the following: Security Officer Security Analyst/Administrator Systems Security Engineer Security Manager /Specialist Auditor Security Professional Risk Analyst Vulnerability Analyst Network Administrator System Administrators Network Engineer Job Roles You Might Need To Take Responsibility As Certified Ethical Hackers Security Analyst Manual Ethical hacker Vulnerability Assessment Analyst Cyber Defense Analyst Cybersecurity auditor IT security administrator System security administrator Senior Security Consultant Security audit Network Security Engineer Cybersecurity Analyst Network Engineer SOC Security Analyst Information Security Analyst Warning Analyst InfoSec Security Administrator Benefits of Taking Up CEH v11 Certification To make it even convincing for you, below mentioned are a few of the benefits you avail with CEH v11 certification. Take a look: You are certainly able to open a lot of career opportunities with the respective course. It lets you advance in your career significantly. You get to understand what hackers might do to harm your business, and accordingly, you can take precautions. You get your knowledge related to risks and vulnerabilities improved with the assistance of the respective course. You benefit from a lucrative package in terms of salary as a Certified Ethical Hacker. Lastly, you also get to learn different types of real hacking tools as well. Wrap Up This shows why you must not hesitate and pursue the CEH v11 course even after the latest Windows 11 update. It gives you an edge over the other candidates and lets you have a successful career ahead. Good Luck!

Read More

A 4 Step Guide to Stronger OT Cybersecurity

Article | April 14, 2020

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is that cyberthreats, like disruptionware, are increasing in quantity and sophistication all the time. Industrial control system (ICS) networks are categorized as high risk because they are inherently insecure, increasingly so because of expanding integration with the corporate IT network, as well as the rise of remote access for employees and third parties. An example of an IT network within a control system is a PC that’s running HMI or SCADA applications. Because this particular PC wasn’t set up with the initial intention of connecting to IT systems, it typically isn’t managed so can’t access the latest operating system, patches, or antivirus updates. This makes that PC extremely vulnerable to malware attacks. Besides the increased cyberthreat risk, the complexity resulting from IT–OT integration also increases the likelihood of networking and operational issues.

Read More

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

Article | February 22, 2020

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet-of-things devices to a range of attacks. IoT manufacturers will often outsource components, so a mistake in one SoC can impact a wide range of connected doodads. The most troubling part, though, is that medical devices like pacemakers and blood glucose monitors are among the affected tech. YouTube Gaming, meanwhile, wants to take Twitch's crown as the king of videogame streaming. But its most-viewed channels are almost all scams and cheats, a moderation challenge that it'll have to take more seriously if it wants the legitimacy it's spending big money to attain. In another corner of Alphabet's world, hundreds of Chrome extensions were caught siphoning data from people who installed them, part of a sprawling adware scheme.

Read More

Spotlight

PC Pitstop

PC Pitstop was founded in November 1999 by Rob Cheng and Dave Methvin with the sole purpose of creating a better way to diagnose common computer problems. Prior to creating PC Pitstop, Rob Cheng was a Senior Vice President at Gateway Computers responsible for Gateway's Consumer business worldwide including profit and loss responsibility.

Events