Showing posts with label CyberCrime. Show all posts
Showing posts with label CyberCrime. Show all posts

Thursday, February 11, 2021

Cybersecurity expert warns about the dangers of working from home


Cybersecurity expert warns about the dangers of working from home
 | #TpromoCom | Nuclear war would require billions of dollars and years of development. But someone in a basement can pull off a devastating cyberattack that takes down the critical infrastructure for practically nothing (wrcbtv
). https://bit.ly/3a8LKQN

On computer monitors at cybersecurity companies around the country, animated world maps show live cyber-attacks happening around the world. The attacks targeting the United States are often directed at health care systems, government offices, and regular people who are working on their computers. The attacks are often administered through email attachments and links, and websites that contain links to malware. It's easy to look at those animated maps and realize we are at war.

To read the remainder of this informative article: 





Follow us on Social Media or email us:

Wednesday, February 10, 2021

'What nightmares are made of.' Hackers hit Fla. water supply

'What nightmares are made of.' Hackers hit Fla. water supply (image)

'What nightmares are made of.' Hackers hit Fla. water supply | #TpromoCom #WaterSupply #CyberSecurity | A #hacker tried to poison a Florida city's water supply by spiking levels of a dangerous chemical, law enforcement authorities said yesterday (eenews net). https://bit.ly/3tMxVze

The unsuccessful cyberattack Friday on a water treatment plant in Pinellas County — the first documented attempt to hack into and contaminate a U.S. community's water supply — raises questions around critical infrastructure security as water and energy utilities move to digitize their operations.

A hacker gained access to a water treatment facility serving around 15,000 people in the city of Oldsmar, changing the levels of sodium hydroxide... 





Follow us on Social Media or email us:

Monday, February 1, 2021

How the Best Hackers Learn Their Craft

How the Best #Hackers Learn Their Craft
 | #TpromoCom #CyberSecurity | Do you want to know how to build a top-ranked competitive hacking team?

It's all about the system. In sports, we understand systems that coaches can use to build a system for identifying talent, recruiting them, training them up, and competing in big games. Learn our proven system for building an elite team of hackers that win DEFCON. It's surprisingly easy, but not what you'd think.

Watch this informative webinar now...





Follow us on Social Media or email us:

Saturday, January 30, 2021

Shadow IoT

Shadow IoT | #TpromoCom #IoT #ShadowIoT #CyberSecurity | A big security problem can become a bigger opportunity for channel pros who can detect, secure, and manage rogue smart devices connected to business networks. https://bit.ly/3tbfBzK (James E. Gaskin

BUSINESSES HAVE STRUGGLED for decades with “shadow IT”—printers, laptops, smartphones, cloud services, and more being installed or subscribed to by users without permission or knowledge of an IT admin. In that same vein, users are now connecting smart devices of various kinds to the corporate network, giving rise to the term “shadow IoT.”

It’s a much bigger problem too, according to Zeus Kerravala, principal analyst at ZK Research, "because the scope has broadened. Things you never would have connected before are now connecting." As an example, he cites the Target breach from a few years ago. "The AC system was compromised, and it was on the same network as the point-of-sale system." When the hackers went through the AC system to the POS server, red flags theoretically should have gone up and the AC system should have been immediately quarantined.

Interested in knowing more about Shadow IoT and how to prevent it? 


Follow us on Social Media or email us:

Tuesday, January 12, 2021

What is a honeypot?

What is a honeypot? | #TpromoCom #Hacker #Server #Network #Security | Honeypots are decoy systems or servers deployed alongside production systems within your network (rapid7.com) https://bit.ly/3qdcd4P


When deployed as enticing targets for attackers, honeypots can add security monitoring opportunities for blue teams and misdirect the adversary from their true target. Honeypots come in a variety of complexities depending on the needs of your organization and can be a significant line of defense when it comes to flagging attacks early. 


This page will get into more detail on what honeypots are, how they are used, and the benefits of implementing them. 




Follow us on Social Media or email us:

Monday, January 4, 2021

A chat with hacker Keren Elazari [Podcast]

A chat with hacker Keren Elazari [Podcast] | #TpromoCom #Hacker #WhiteHat #Cyber | How did the movie “Hackers” inspire a girl to grow up to become a hacker herself? Find out from security analyst and friendly hacker Keren Elazari. http://bit.ly/38f71aE

Hear about Keren’s incredible journey, why hackers should be welcomed with open arms, and the inspiration that guided her career.

"Ms Elazari is a legend in her own time. Listening to her personal story of how she became a hacker with a hankering to do good as a white hat is inspiring to say the very least," says Al Colombo, Senior Design Specialist with Thunder Promotions (TpromoCom) of Canton, Ohio. 

Without further ado, CLICK HERE and listen to the story of Keren Elazari!


Follow us on Social Media or email us:

Saturday, December 19, 2020

Integrators: Beware More Supply Chain Cyber Attacks


Integrators: Beware More Supply Chain Cyber Attacks
 
| #TpromoCom #SolarWinds #Hacker #Hackers #CyberSecurity | The SolarWinds hack is an example of a supply chain attack that integrators and AV software companies need to defend against.

The recent news of a large-scale attack on the part of a foreign government utilizing popular network monitoring tools should have integrators questioning the security of the remote monitoring tools they use.

U.S. government officials, cybersecurity experts and tech giants are working around the clock to uncover more evidence and possibly other supply chain attack vectors after IT software company SolarWinds disclosed that versions of its popular Orion product was compromised by foreign cyber actors.

Read the remainder of this Commercial Integrator news story here: 


Thursday, December 17, 2020

How suspected Russian hackers outed their massive cyberattack

How suspected Russian hackers outed their massive cyberattack | #TpromoCom #Hacker #Hackers #CyberSecurity #Government | A cybersecurity firm says a suspicious log-in prompted it to investigate what turned out to be a gaping security hole for the U.S. government and many large companies (politico.com
Foreign hackers who pulled off a stealthy breach of at least a dozen federal agencies got caught after successfully logging in to a top cybersecurity firm’s network, tipping the company off to a broader hacking campaign targeting the U.S. government, according to officials from the firm and congressional aides briefed on the issue.
The suspicious log-in prompted the firm, FireEye, to begin investigating what it ultimately determined to be a highly damaging vulnerability in software used across the government and by many Fortune 500 companies.
Read more? 

Wednesday, December 9, 2020

Alexa, disarm the victim’s home security system

Alexa, disarm the victim’s home security system | #TpromoCom #Alexa #Security #Hackers | Kelly Jackson Higgins, Executive Editor at Dark Reading, explores how hacking attempts on ‘smart’ home assistants via laser pointers have raised further security concerns about the devices. (ifsecglobal.com) https://bit.ly/2JNIeRy

Researchers who last year hacked popular voice assistants with laser pointers take their work to the next level.

It’s still a mystery to researchers at the University of Michigan and The University of Electro-Communications (Tokyo) – just what physically enabled them to inject commands into the embedded microphones of Amazon Alexa, Google Home, and other digital voice assistant devices via laser pointers.

Read more here:


Protect your health,
it's the only thing you can depend on!




Monday, December 7, 2020

Data Exfiltrated From Alaskan Voter Registration Servers

Data Exfiltrated From Alaskan Voter Registration Servers | #TpromoCom #VotingComputers #CyberSecurity #CyberWarefare | Officials Believe Stolen Data Used for Voter Intimidation, Propaganda (databreachtoday.com)

Hackers exfiltrated voters' personally identifiable information from online voter registration servers in Alaska in September, and the information likely was used for voter intimidation and propaganda purposes, state officials say.

Registered voters' names, dates of birth, driver's licenses or state identification numbers, last four digits of their Social Security numbers, mailing addresses and party affiliation were compromised, according to officials at the Alaska Division of Elections.

Read the rest here: