How to Identify and Protect Against Phishing Attacks

Data brokers collect your personal information from various sources and compile detailed profiles. That’s why cybercriminals love data brokers. They hoard your info from everywhere: public records (voter rolls, property ownership), online stuff (browsing history, social media profiles, newsletter signups), and even commercial sources (loyalty programs, purchases). This intel helps them craft compelling and realistic phishing scams or impersonate you or trusted sources to steal private info or money.

Evolution of Cybercrime Investigations

Cybercrime costs trillions, rising yearly. Criminals operate globally, teaching their methods. This article explores major cyberattacks from 1962 to 2024 and how investigators use advanced technology to combat them.

How to stay safe from cybercriminal “quishing” attacks | TechRadar

Phishing works so well because it relies on hacking the human psyche. We want to trust the stories we’re told – especially if they’re told by ostensibly trustworthy organizations or individuals. This is an admirable, but highly exploitable, trait. As technologies evolve, threat actors are continually refining the methods they use to take advantage of trusting end-users.

This new ransomware scam will hassle you with phone calls until you pay up | TechRadar

TRENDING

Expert Insights

Best web hosting

Best website builder

Best standing desks

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Pro 

 

Security

This new ransomware scam will hassle you with phone calls until you pay up

News

By Sead Fadilpašić

 published yesterday

Victims threatened with repeated phone calls

 

 

 

 

 

Image credit: Pixabay (Image credit: Pixabay)

A new ransomware group has been discovered harassing its victims on the phone until they pay up. 

Advertisement

A report from anti-ransomware company, Halycon said that Volcano Demon was seen going after “several” targets in the last couple of weeks, deploying a new encryptor called LukaLocker. 

Its methodis relatively simple – the threat actor will first find a way into the target network, map it out, and then exfiltrate as many sensitive files as they can. Then, they will deploy the encryptor, lock down the files and entire systems, and then demand payment in cryptocurrency in exchange for the decryption key, and for keeping the files for

iPhone users in 98 countries warned about spyware by Apple | Malwarebytes

Whether you’ve received that notification or not, every iPhone user should make sure they have the latest updates, protect the device with a passcode, use multi-factor authentication and a strong password for Apple ID, only install apps from the Apple Play store, use a mobile security product, and be careful what they open or tap on.

SecurityWeek: AT&T Data Breach: ‘Nearly All’ Wireless Customers Exposed in Massive Hack

AT&T on Friday said almost all its wireless subscribers were exposed in a massive hack that occurred between April 14 and April 25, 2024, where a hacker exfiltrated files containing “records of customer call and text interactions” between approximately May 1 and October 31, 2022, as well as on January 2, 2023.

350 million people downloaded insecure browser extensions over two years | Cybernews

In all, the academics discovered more than 26,000 extensions they believed had issues inherent in them, with around 15,400 of them violating privacy rules. A further 10,400 or so contained malware that could harm users.

Alabama education department still impacted by thwarted ransomware intrusion | SC Media

More ransomware news.  Education and Health Care sectors seem to be popular targets lately. https://www.scmagazine.com/brief/alabama-education-department-still-impacted-by-thwarted-ransomware-intrusion

This new ransomware scam will hassle you with phone calls until you pay up | TechRadar

TRENDING

Expert Insights

Best web hosting

Best website builder

Best standing desks

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Pro 

 

Security

This new ransomware scam will hassle you with phone calls until you pay up

News

By Sead Fadilpašić

 published yesterday

Victims threatened with repeated phone calls

 

 

 

 

 

Image credit: Pixabay (Image credit: Pixabay)

A new ransomware group has been discovered harassing its victims on the phone until they pay up. 

Advertisement

A report from anti-ransomware company, Halycon said that Volcano Demon was seen going after “several” targets in the last couple of weeks, deploying a new encryptor called LukaLocker. 

Its methodis relatively simple – the threat actor will first find a way into the target network, map it out, and then exfiltrate as many sensitive files as they can. Then, they will deploy the encryptor, lock down the files and entire systems, and then demand payment in cryptocurrency in exchange for the decryption key, and for keeping the files for themselves.

Don’t overlook the security risk posed by QR codes | TechRadar

But the more mainstream the technology has become, the more attractive it has become for threat actors. The same accessibility that makes the QR code a useful tool also makes it an effective vector for phishing and malware delivery.