What is phishing?
Phishing is when someone tries to trick you into divulging sensitive information like passwords, bank accounts, etc. Phishing attacks are often conducted via email where the email is made to appear as though it’s coming from someone you trust.
Examples of phishing
One example of phishing would be if a scammer sends you an email that’s Continue reading “Phishing: Avoid Getting Caught By The Scam”
Lately there has been a growing concern of botnets fueled by an increasing number of botnet-related articles in the news. The concern is valid as all signs point to botnets growing in number, size, and sophistication.
The botnet threat isn’t likely to go away anytime soon and it’s probably going to get worse before it gets better.
Here’s what you should know about botnets.
Continue reading “What Is A Botnet And Why You Should Care”
Security is the number two priority for small business IT.
Why is security the second most important thing for small business IT?
Because without proper security, your network and your data are at risk.
And the scariest thing about not having good security is that you might not even know that your network and data have been compromised. Hackers could already be inside your network, roaming through your data, using your property to hide out and launch attacks at other networks.
Doesn’t seem possible? Well, Madison Square Garden was hacked and credit card data was being captured and sent to thieves for almost a year before it was detected.
What if you found out that someone you didn’t know had broken into your house a year ago and was using your house, laying in your bed, wearing your clothes, eating your food, and going through your mail without you knowing it?
Continue reading “Security Is Small Business IT Priority #2”
Hackers compromised five different locations of the Madison Square Garden Company: Madison Square Garden itself, The Theater at MSG, Radio City Music Hall, and Beacon Theater all in New York plus the Chicago Theater in Illinois.
Continue reading “Security Breach For 1 Year At Madison Square Garden”
A major Internet attack today (2016-10-21) affected popular Internet sites like Amazon, Netflix, Twitter, and more.
The attack was a “distributed denial of service” (DDoS) attack, where a large number of devices, typically a botnet, are used to flood the targets with Internet traffic. The flood of traffic overwhelms the capacity of the targets and disrupts them to the point they are unable to respond to the real data.
It’s believed to have been trigged by a program called Mirai which makes it easy to infect online devices and use them to create a botnet that can launch DDoS attacks like this one.
What’s really scary is that it doesn’t even take a skilled hacker to use Mirai and tools like it to infect large numbers of devices, create botnets, and then use them in attacks.
Continue reading “Recent Internet Attacks Affect Amazon, Netflix, Twitter, And More”
Digital Trends has an article about a recent security breach that resulted in the loss of 58 million personal records.
As if that’s not bad enough, the article claims nearly 3,000 reported security breaches so far in 2016 of 2.2 billion records.
Those numbers are astronomical!
Continue reading “Security Breaches Resulting In Loss of 2.2 Billion Personal Information Records So Far In 2016”
Previously, I posted about Internet devices like security cameras and DVRs being hacked to form a botnet army that was then used to launch attacks against other targets. [Internet Devices Get Hacked]
I wanted to draw a link from this fact (that Internet devices of all kinds are susceptible to attack) to an earlier post I made about a common IT myth, the myth that small businesses don’t have to worry about security because hackers wouldn’t go after them.
Continue reading “Hacked Devices and IT Myth #1”
In a Wall Street Journal article from Sep 30, 2016, author Drew Fitzgerald writes about recent attacks that were carried out by a botnet “army” against multiple targets including at least one each in the US and France.
According to the article, as many as 1 million devices may have participated in the attack.
The devices used in the attack were not massive, powerful servers or computers in some highly-connected data center. No. In fact, they weren’t even server or computers at all in the traditional sense.
Continue reading “Internet Devices Get Hacked”