Guelph Mercury • 4th October 2022 Here’s what cybercriminals do to your stolen data, according to a University of Guelph cybersecurity expert Here’s what cybercriminals do to your stolen data, according to a University of Guelph cybersecurity expert
MUO • 25th April 2021 What Is Cybercrime as a Service? The cybercrime landscape has evolved to become a highly lucrative and organized business. Using the as-a-service business model, cybercriminals are now offering their services and hacking tools to anyone willing to pay for them or split the profits. Here’s what this trend is about and why we should all be worried about our digital security. What Is Cybercrime as a Service? Cybercrime as a Service (CaaS) is the umbrella term used to describe an organized business model that involves malware de
MUO • 5th March 2021 What You Need To Know About Golang-Based Malware Golang is becoming the programming language of choice for many malware developers. According to cybersecurity firm Intezer, there’s been an almost 2000 percent increase in the number of Go-based malware strains found in the wild since 2017. The number of attacks using this type of malware is expected to increase in the next couple of years. What’s most alarming is that we’re seeing many threat actors who are targeting multiple operating systems with strains from a single Go codebase.
MUO • 24th April 2021 Your Website Has Been DDoSed - But What Does DDoS Mean? You may have heard of hackers taking down websites in a DDoS attack. During a DDos strike, users will see a server error message whenever they try to access the website or service. Companies who get DDoSed suffer thousands of dollars' worth of damages. The longer hackers keep their sites down, the more money victims lose. So what is a DDoS attack? What is the actual definition of a DDoS attack? A DDoS or Distributed Denial of Service is a type of cyberattack that targets web servers, database
Guelph Mercury • 23rd August 2022 ‘Doxxing can be a life-and-death concern’: University of Waterloo professor warns of cyberattack that can turn deadly ‘Doxxing can be a life-and-death concern’: University of Waterloo professor warns of cyberattack that can turn deadly People unknowingly put themselves at risk to this type of cyberattack all the time says information security professor.
MUO • 10th March 2021 What Is a Remote Access Trojan? RATS or Remote Access Trojans have gone a long way from the prank tool 90s kids used to spook their friends. From simply opening CD trays and controlling computers remotely to scare their victims, it has evolved into some of the most prevalent malware in the wild. Here’s everything you need to know about this Trojan and what you can do about a RAT infestation. A RAT is a Trojan, a type of malware disguised as something else that victims need—like a legitimate file, program, or app. It tricks
MUO • 20th February 2021 Were You Affected By the DoorDash Data Breach? The demand for food delivery services like DoorDash has skyrocketed in the wake of the Coronavirus pandemic. Since we give these apps a treasure trove of personal and banking information, you need to ask yourself, is my information safe? A massive DoorDash data breach by a third party was discovered in May 2019. A slew of personal information and financial details were compromised during the leak putting many at risk of a cyberattack. So how do you find out if you were affected by the DoorDash
MakeUseOf • 14th December 2020 What is a Credential Stuffing Attack? Credential stuffing is a type of cyber attack that involves ‘stuffing’ stolen credentials into multiple websites. Tools like bots have allowed hackers to automate the stuffing, allowing them to test millions of login credentials against dozens of sites in a short period. Here’s what you need to know about this attack and the simple ways you can protect yourself.
MUO • 18th April 2021 What Is a Password Manager? Reusing your passwords makes you vulnerable to hacking, so you should have a different password for every online account. Even more so for websites that contain sensitive data like your banking details, social security number, or home address. But remembering and retrieving passwords for all your accounts can be challenging to say the least. That's why you need a password manager. A password manager is an application that is designed to store all your online credentials. It makes it easier for
MakeUseOf • 22nd January 2021 Can Bluetooth Be Hacked? 7 Tips to Keep Your Bluetooth Secure Yes, Bluetooth can be hacked. While using this technology has offered a lot of creature comforts, it has also exposed people to cyberattacks. Almost all devices are Bluetooth enabled—from smartphones to cars. People are surrounded by this technology every single day. But what many don’t realize is that using a Bluetooth connection comes with a host of security and privacy risks.
MakeUseOf • 9th December 2020 What is LokiBot Malware and How Can You Protect Yourself? Cybersecurity agencies warn of an alarming surge in LokiBot malware attacks. The malware, which mainly targets Windows and Android devices, has been spreading fast over the past couple of months. Here’s what you need to know about this threat, what you can do to protect yourself, and how to deal with a LokiBot infection.
MUO • 22nd April 2021 What Is a Facebook Cloning Scam? This seemingly simple yet nefarious scam has been around for years. Cybercriminals don’t even need to hack into your account but they use social engineering and stalking to target you and your friends. Here’s everything you need to know about the Facebook cloning scam, how to check if you’re already a victim, and what you can do to protect yourself. This type of scam involves using a cloned account to send phishing links, or trick your friends into giving information, or, worse, sending money.
MUO • 20th March 2021 Why That Email About Your Apple ID Being Locked Is a Scam Since macOS and iOS are still more secure and impenetrable compared to other systems, cybercriminals resort to phishing tactics to hack into Apple accounts. They use social engineering to trick users into giving their Apple ID and password. So yes, that "Apple ID locked" email is fake. Here’s what you need to know about Apple scams and how you can spot one. Scammers who are out to steal your Apple information will use social engineering through phone calls, SMS, or even calendar invitations. B
MUO • 12th March 2021 What You Need To Know About Swatting Imagine opening your door to see a swarm of heavily armed SWAT officers pointing their guns at you. You don’t know what’s happening. You have no idea why they’re raiding your home and kicking doors open. If this happens to you, you’ve become a victim of swatting. This means that someone placed a hoax 911 call to send authorities to your house. Many celebrities have become victims to this insidious “prank” and while it might seem like a joke for some, it can become extremely dangerous, even dead
MUO • 22nd April 2021 How to Make Your Photos Private on Facebook There are many reasons you should make your photos private on Facebook. Aside from privacy concerns, the site is also teeming with unscrupulous scammers who want to take advantage of other people on the platform. To deal with this issue, Facebook has customizable settings that allow you to restrict access to your photos or hide your photos from others. You can set some to be viewable only by your friends or make them completely private and only viewable to you. Here's all you need to know abou
MakeUseOf • 31st October 2020 What is Pharming and How Do You Protect Yourself From It? Pharming is a type of cyber attack that involves redirecting web traffic from a legitimate site to a bogus site. The latter is designed to look like the legitimate site so users will be duped into logging in and typing their details. These details are then harvested by "pharmers" and used for illegal activities. Like phishing, pharming is meant to collect user information like username and passwords or bank details. Although compared to phishing, pharming is much more sophisticated and sinister.
MakeUseOf • 20th November 2020 Everything You Need to Know About NetWalker Ransomware Netwalker is a strain of ransomware that targets Windows-based systems. First discovered in August 2019, it evolved throughout the rest of 2019 and into 2020. Significant spikes in NetWalker targeted attacks were noted by the FBI during the height of the Covid-19 pandemic. Here's what you need to know about the ransomware that has attacked major schools, healthcare systems, and government institutions throughout the US and Europe.
The Record • 18th September 2023 Sextortion now biggest rising, online threat to kids and teens in Waterloo Region, says cybercrime sergeant Monsters have gone out of the closet and into children’s phones. There is a sinister threat lurking behind children’s screens and local police are warning about this alarming trend that has led to youths dying by suicide in some parts of Canada.
MUO • 15th March 2021 3 Airbnb Scams You Need to Know About Before Booking Your Trip Airbnb has long been criticized for its loose policies and even looser enforcement. Its rules are filled with loopholes that scammers have wriggled their way into. Things have gotten so bad that the internet is now filled with horror stories from vacationers who had a bad experience on the platform. Here are some of the most common Airbnb scams you should know about before booking somewhere for your next vacation, and tips for protecting yourself. The most common scammers you might encounter
MakeUseOf • 29th November 2020 Can You Trust LinkedIn With Your Personal Data? LinkedIn is still the most trusted social platform according to the 2020 Digital Trust Report. It has consistently ranked number 1, ahead of other social media giants like Facebook and Twitter, for years. According to many consumers, the platform for the world’s business community is the one people are most confident in storing their private data securely. But how much can you really trust LinkedIn?