Adventures in Cyber Security
The latest cyber security concerns span the personal and corporate worlds. Here are five we wanted to bring to your attention:
- Be on the lookout for Spotify phishing emails. The purpose is to lure Spotify users into giving up their user credentials, which can then be sold or used to hijack users’ other, more profitable accounts – like online banking. This particular attacker has set up a convincing replica of the Spotify login – so be sure you check the actual URL before falling into this trap.
- Fake apps – check out this recent article about 13 malware-laden fake apps on Google Play, and be sure to use caution when downloading any apps to any of your devices.
- Doing any online shopping this holiday season? While deals are great, many of the “best” deals turn into disasters when thrifty shoppers give up their credit card details to fake e-commerce sites. Run a “WHOIS” domain search if you are suspicious, and be wary if the date created is very recent. Fake sites go up and down and up and down, similar to illegitimate telemarketing firms that move from place to place, phone number to phone number. Always shop with a credit card to keep thieves away from your bank account. And https: or a padlock symbol is not a guarantee that your shopping experience is secure or that the online store is not just a front for a scam.
- Have any expiring domains? If you are using them for anything, have a site that used to be active, or have material in the domain you want to keep – be sure to pay your renewal! Criminals have been snapping up recently expired domains to take advantage of legitimate-sounding domain names and using them for ecommerce stores that steal credit card information. Don’t assuming your domain will still be available if you let it lapse, no matter how specific its name.
- In a recent security report by StackRox, out of 230 organizations surveyed most are concerned that their cloud-deployments are not secure – and one-third of the respondents haven’t started or have just started creating security strategy plans. The respondents’ noted that misconfigurations and post-deployment security were what troubled them the most – and with more and more cloud computing errors leading to compromised and inappropriately exposed data, their fears seem well-founded. Just remember that, while cloud computing offers great services, the ease of access and breadth of data can sometimes be too easy (and too tempting) for hackers.
If you are concerned about securing your personal data as well as your company systems, Blutone Technologies offers the protection you need. Take a look at My Personal Helpdesk and find the system protection that’s right for you – and if you need anything, just give us a ring.