Double, double, toil and trouble; Fire burn, and cybercrime bubble!
Cyber Security, High Technology, Technology, Uncategorized Posted Oct 26, 2018 by Gabrielle Kondracki
As green leaves turn to reds, auburns and yellows and darkness approaches the night too early and lingers too late, the sweeping wind and crisp air welcome yet another fall in New England.
The eerie feel of flowers dying, animals hibernating, and the sun weakening arrives just in time for the spookiest holiday of the year: Halloween. From pumpkin patches to corn mazes and everything in between, it’s always fun leading up to a night of parties, costumes and candy as kids pile around for an epic sweet-tooth barter of Reese’s Cups for Kit Kats.
But, it’s not always fun and games. Scary stories of ghosts and witches, haunted hayrides of mummies and werewolves also find their place among the night’s events and the CHEN PR gang is ready to frighten.
In preparation for the bone-chilling evening, we dare all to move outside of the many ghouls and goblins that we dramatize on Halloween, and into the terrors facing many businesses and consumers alike. With that, we invite you all to join the Witches of Downtown Crossing as we stir up the cybercrime cauldron. (Caution! *Enter at your own risk*)
Round about the cauldron go, cryptomining high, ransomware low. As security tactics continue to strengthen against cybercrime, criminal hacking skill-sets strengthen right along with it. In 2018, trends have shifted away from demanding victims to send bitcoins in exchange of stolen data. Instead, cybercriminals are infecting victim computers with bitcoin-mining software without showing a trace. By early 2018, about 90% of all remote code execution attacks were associated with cryptomining. Don’t be caught victim to these attacks! Learn how to prevent and detect them here.
Fluxweed, knotgrass, breaches too: They make up our witches’ brew. Breaches aren’t going anywhere as attacks continue to make up a large portion of the cybercrime world. That doesn’t mean you can’t fine-tune your eye, though, to recognize a breach more quickly than years past. The majority of cost increases due to breaches comes from not reacting fast enough. Taking a page out of SafeBreach’s Hacker’s Playbook™, dress up as the hacker and look for weaknesses in your security system before a hacker finds them.
Lizard’s leg and tongue of a mouse, cursed devices in your smart house. As the Internet of things (IoT) becomes another household name, with devices like Alexa becoming part of the family, we tend to forget that these devices use tiny sensors that transmit data and share information in the cloud. This makes us susceptible to big security risks because many of these devices aren’t adequately protected. With unsecured IoT devices, attackers can form unsupervised back road paths into networks, totally bypassing mainstream devices like PCs and servers. Protect yourself from IoT threats with these simple steps.
Scale of dragon, a wolf declawed, Witches’ mummy, and credit card fraud. As cash continues to be replaced with credit cards, it opens a larger opportunity for cybercriminals to steal banker information and commit fraud. By collecting small amounts of personal data from several related servers, hackers can construct a more direct line of communication with a victim that seems authentic, thus phishing consumers into handing over more personal data. Don’t be tricked! Look for ways to protect yourself from payment card fraud.
Double, double toil and trouble; Fire burn and cybercrime bubble! As our brew boils, it’s important to understand these cybercrime trends and take the right steps to prevent, detect, and protect yourselves against them. After all, no one wants to be left tricked when they thought they’d be receiving treats!