TECH Support Fraud: How the Fraud Occurs..?

Based on new reporting, the Internet Crime Complaint Center (IC3) is providing updated guidance regarding technical support fraud. Tech Support Fraud involves a criminal...

CISA, FBI releases a list of top 10 vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government released a list today of the...

Cyber Actors use IoT Devices as Proxies for Anonymity & Pursuit of Malicious Cyber...

Cyber actors actively search for and compromise vulnerable Internet of Things (IoT) devices for use as proxies or intermediaries for Internet requests to route...

Agent Tesla Remote Access Trojan Spreading Widely In COVID-19 Related Spam Campaigns

Check Point’s researchers find a sharp increase in attacks using the new version of Agent Tesla capable of stealing Wi-Fi passwords, while Dridex banking...

Passwords on the Rise Despite Evidence that They are Increasingly Unable to Protect, Finds...

Almost a third (29%) of organisations across Europe and the Middle East see usernames and passwords as one of most effective access management...

CompTIA Offers IT Professionals Free Resource to Help Combat DDoS Attacks

Information technology (IT) professionals facing an increasing number of Distributed Denial of Service (DDoS) attacks can get help in their battle from CompTIA, the...

Tips to Ensure Long-Lasting Battery of Your Smartphone

Your smartphone has evolved to become an extension of yourself, connecting you to the world. From news updates to all your entertainment needs, your...

Cyber Actors Increasing Exploit the Remote Desktop Protocol to conduct Malicious Activity

Remote administration tools, such as Remote Desktop Protocol (RDP), as an attack vector has been on the rise since mid-late 2016 with the rise...

Cyber Actors use Online Dating sites to conduct Confidence/Romance Fraud & Recruit Money Mules

WHAT IS CONFIDENCE/ROMANCE FRAUD? Confidence/romance fraud occurs when an actor deceives a victim into believing they have a trust relationship—whether family, friendly, or romantic—and leverages...

World Password Day 2020: Password Tips & Tricks

Today May 5th, 2020 is - World Password Day 2020 Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords...

TECH NEWS

TOP STORIES

Cyber Security