The Identity Theft Resource Center (ITRC) found that reports of job scams increased by 118% in 2023 compared to the prior year. That occurred even as the number of overall scams reported to the ITRC fell by 18%.
Month: July 2024
Free Self-Paced Courses from the Cisco Networking Academy
This introductory course takes you inside the world of cybersecurity. You will learn cybersecurity basics to protect your personal digital life and gain insights into the biggest security challenges companies, governments, and educational institutions face today. Cybersecurity professionals who can protect and defend an organization’s network are in high demand.
350 million people downloaded insecure browser extensions over two years | Cybernews
In all, the academics discovered more than 26,000 extensions they believed had issues inherent in them, with around 15,400 of them violating privacy rules. A further 10,400 or so contained malware that could harm users.
Alabama education department still impacted by thwarted ransomware intrusion | SC Media
More ransomware news. Education and Health Care sectors seem to be popular targets lately. https://www.scmagazine.com/brief/alabama-education-department-still-impacted-by-thwarted-ransomware-intrusion
This new ransomware scam will hassle you with phone calls until you pay up | TechRadar

TRENDING
Expert Insights
Best web hosting
Best website builder
Best standing desks
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
Pro
Security
This new ransomware scam will hassle you with phone calls until you pay up
News
By Sead Fadilpašić
published yesterday
Victims threatened with repeated phone calls

Image credit: Pixabay (Image credit: Pixabay)
A new ransomware group has been discovered harassing its victims on the phone until they pay up.
Advertisement
A report from anti-ransomware company, Halycon said that Volcano Demon was seen going after “several” targets in the last couple of weeks, deploying a new encryptor called LukaLocker.
Its methodis relatively simple – the threat actor will first find a way into the target network, map it out, and then exfiltrate as many sensitive files as they can. Then, they will deploy the encryptor, lock down the files and entire systems, and then demand payment in cryptocurrency in exchange for the decryption key, and for keeping the files for themselves.
Navy tests using drones for medical supply deliveries during RIMPAC
As the Navy looks to further integrate drones into the manned fleet, the sea service assessed using unmanned aerial systems to deliver critical supplies to the destroyer Curtis Wilbur last month during the massive Rim of the Pacific military exercise.
7-Step Plan to Succeed in Chess in 2024
GM Noël Studer shares how you can train effectively, stay inspired, be consistent and more.
Army testing ‘pocket-sized’ drones that could soon be in the hands of every squad | Fox News
The tiny drones, which have already deployed with units such as the Army’s legendary 82nd Airborne Division, are small and lightweight enough that a single soldier can carry the drone, controller, and batteries needed to operate the system as part of their standard combat load. Once in the air, the device can transmit live video and HD still images of the surrounding area.
Australian military to buy small US-made lethal drones being used by Ukrainian forces – ABC News
At present the ADF operates around 760 unmanned aerial systems mainly for surveillance missions, with some models capable of being armed. But the Defence department is also trialling low-cost, expendable systems which can be produced in vast numbers.