Showing posts with label Cybersecurity. Show all posts
Showing posts with label Cybersecurity. Show all posts

Monday, August 23, 2021

Video surveillance network hacked by researchers to hijack footage

Video surveillance network hacked by researchers to hijack footage, Nakedsecurity (image)

Video surveillance network hacked by researchers to hijack footage | #TpromoCom #VideoSurveillance #CCTV #Hacker #Hackers #CyberSecurity | Researchers at security company Mandiant have written up a report about a device-hijack bug in a video sharing and surveillance network called Kalay (nakedsecurity). https://bit.ly/3sDSsWJ

Operated by Chinese smart device company ThroughTek, Kalay (which apparently means “handshake” in the Dawu language) is pitched as a cloud-based solution for vendors of home automation devices, including security cameras, smart locks, video doorphones, smart power plugs, and even personal cloud storage hardware such as NAS devices.

As you can see, the idea is that instead of creating their own protocol, setting up their own... (read more)

Bitdefender 2020 728x90



Follow us on Social Media or email us:

Thursday, August 19, 2021

Grid’s ‘town crier’ separates cyber signal from noise


Grid’s ‘town crier’ separates #cyber signal from noise | #TpromoCom | The U.S. power grid’s hub for cyberthreat information got word last December that hackers had breached FireEye Inc., one of the world’s largest cybersecurity companies (eenews). 

FireEye wasn’t the only victim: Several government agencies soon discovered that they, too, had been swept up in a massive hack of Austin, Texas-based IT firm SolarWinds Inc., whose hijacked Orion software product was also used by many large electric utilities.

"We immediately spun up into response mode," said Manny Cancel, CEO of the Electricity Information Sharing and Analysis Center (E-ISAC), in a recent interview. The information clearing... (read more

Alison provides free educational courses.

You can purchase a certificate if you pass the final examination. This is not merely a certificate of attendance, but you must know the subject matter after taking a real final test. 

Check it out today!  

Click on the banner above to learn more!


Follow us on Social Media or email us:

Monday, August 16, 2021

Morse Code Used by Hackers in Phishing Attacks

#Hackers Spotted Using Morse Code in #Phishing Attacks to Evade Detection
| #TpromoCom #CyberSecurity #CyberCrime | Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. https://bit.ly/3yNfWed

The phishing attacks take the form of invoice-themed lures mimicking financial-related business transactions, with the emails containing an HTML file ("XLS.HTML"). 

The ultimate objective is to... (read more)

Bitdefender 2020 728x90


Follow us on Social Media or email us:

sm081621A

Saturday, July 31, 2021

NSA to National Security Employees: Avoid Working on Public Wi-Fi

NSA to National Security Employees: Avoid Working on Public Wi-Fi | #TpromoCom #Government #WiFi #NSA #CyberSecurity | The COVID-19 pandemic changed what work looks like, and for some, telework remains an essential part of daily business. https://bit.ly/3jWmW20

While most teleworkers connect via secure home networks, those that opt for public networks like those in hotels or coffee shops are putting their data at risk, according to the National Security Agency. 

The NSA on Thursday released guidance for National Security System, Defense Department, and defense industrial base users describing how to identify vulnerable connections and protect common wireless technologies when working on public networks. US-CERT on Friday shared the guidance as well. 

The first best practice, according to NSA, is... (read more)


WiFi-Connected Smoke Detector Alerts You Immediately

Installation is easy! Protect your home and 
family from fire and smoke today!

XS01-WT WiFi Smoke Detector




Follow us on Social Media or email us:

Sunday, June 13, 2021

OnDemand | Changing the Entire Paradigm to Cybersecurity

OnDemand | Changing the Entire Paradigm to Cybersecurity | #TpromoCom #CyberSecurity #DataBreach #DataBreachToday | Register for this informative webinar on cybersecurity! https://bit.ly/3iFPspY

Most cybersecurity protections are based on looking for threats. The problem is, malware is evolving at an alarming rate and threat detection solutions, antivirus and EDR can no longer keep up. ThreatLocker CEO, Danny Jenkins will explain how he’s changing the entire approach and paradigm to cybersecurity with a clean and comprehensive approach to ensuring ransomware does not end up in your environment.

Register for this webinar to learn more about:
  • How easily malware can evade antivirus and other threat detection tools. 
  • The latest cybersecurity breaches along with assets and tools you can implement in your business. 
  • How to implement zero-trust security.

To see this presentation: 


Stormin  Protection: The Finest in Power Quality Assurance





Follow us on Social Media or email us:

Friday, April 9, 2021

Well Known Credit Card Company Describes a New Skimming Method

#Visa Describes New #Skimming Attack Tactics | #TpromoCom #CreditCard #Criminals | Cybercriminals Using Web Shells to Control Retailers' Servers (govinfosecurity.com) https://bit.ly/3mywxNu

The web shells enable fraudsters conducting digital skimming attacks on e-commerce sites to establish and maintain access to compromised servers, deploy additional malicious files and payloads, facilitate lateral movement within a victim's network and remotely execute commands, Visa says.

In February, Microsoft reported spotting 140,000 web shells per month on servers from August 2020 to January 2021, which it said is almost twice the number from the same period the year before. These web shells, however, were not being used for retail attacks. (read more)


Direct link to this page: https://bit.ly/3mywxNu


Follow us on Social Media or email us:

Monday, March 29, 2021

Linux Systems in Peril of Hacking Hackers? Find Out Here!

New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems
| #TpromoCom #Hacker #Linux #CyberSecurity | Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory (thehackernews). https://bit.ly/3fn8fof

Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS scores: 5.5) — impact all Linux kernels prior to 5.11.8. Patches for the security issues were released on March 20, with Ubuntu, Debian, and Red Hat deploying fixes for the vulnerabilities in their respective Linux distributions. 

Find out more here: 

Contact TpromoCom for Content, Social Media,
Press Releases, and Web Design services.

Call 330-956-9003



Follow us on Social Media or email us:

So What Makes a Hacker Tick?

Understanding The Psyche Of A Modern-day #Hacker
| #TpromoCom #Hacker #CyberCrime #CyberSecurity | Every cyberattack varies in cause and damage. Despite this, they all contain key components that are applicable to both external and insider threats (informationsecuritybuzz).  
https://bit.ly/3fnBkQk

The tried and tested formula involves cyberattackers finding a way in, navigating the system, extracting information, and then exiting and covering their tracks. Learning these steps to understand the journey cyberattackers take will help you better protect your organisation from these kinds of attacks. 

You can read the reset of this article here: 


Start out taking FREE courses.
Buy a certificate when you pass your final exam!


Follow us on Social Media or email us:

Friday, March 26, 2021

Why It's Important to Take Down Dark Web Sites

The Case for Taking Down Dark Web Sites

Why It's Important to Take Down Dark Web Sites | #TpromoCom #DarkWeb #CyberSecurity #CyberCrime #Hackers | Taking Down Dark Web Sites May Cause Headache for Both the Bad Guys and the Good Guys (Idan Aharonihttps://bit.ly/2QDTO4J

It’s law enforcement’s main goal to apprehend criminals, and considering it takes time to build a case of evidence, dark web boards can be a treasure trove of leads and relevant data for a case, one that keeps growing as criminals post new content. 

It makes sense for them not to touch a board until they are ready to make their move and apprehend the bigger players on a certain site, usually an international operation involving multiple local agencies.

Read more here: 





Follow us on Social Media or email us:

Monday, March 22, 2021

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers

Acer Faced With Ransom Up To $100 Million After Hackers | #TpromoCom #Hacker #Ransom #Acer | The REvil ransomware group has claimed yet another high-profile victim. The criminals are demanding a massive $50 million from their latest target: Taiwanese computer manufacturer Acer (Lee Mathews). http://bit.ly/3d28vX3

That’s the discounted rate REvil will accept if Acer agrees to pay quickly, and it’s already believed to be a record sum for ransomware demands. The previous high of $30 million was also linked to a REvil attack. (read more)





Follow us on Social Media or email us: