Ransomware, phishing and pretexting are on the rise: Verizon

Ransomware and social attacks have been the big stars in the past year when it comes to cybersecurity, according to the latest edition of Verizon’s popular yearly report. Drawing from datasets aggregated from 67 other organizations, including 53,308 security incidents and 2,216 data breaches, Verizon’s 2018 Data Breach Investigations Report shows that ransomware was the most common type of malware reported. Based on 1,379 malware incidents, 56 percent involved ransomware. Verizon notes that it first mentioned ransomware in its 2013 report and predicted that it would flourish because of how effective it is for cybercriminals. “Now we have seen this style of malware overtake all others to be the most prevalent variety of malicious code for this year’s dataset. Ransomware is an interesting phenomenon that, when viewed through the mind of an attacker, makes perfect sense,” the report says. Ransomware is seen as so effective, Verizon says, because it can be attempted with little risk to […]

The post Ransomware, phishing and pretexting are on the rise: Verizon appeared first on Cyberscoop.

Continue reading Ransomware, phishing and pretexting are on the rise: Verizon

Google Chrome, Oracle, PUBG, and Ransomware – Hack Naked News #168

This week, Google bans cryptomining Chrome extensions, jail for white collar pirates who stole from Oracle, and the world’s most popular YouTube video has been hacked! Jason Wood from Paladin Security joins us for expert commentary, and more on t… Continue reading Google Chrome, Oracle, PUBG, and Ransomware – Hack Naked News #168

Your Phone’s Betrayal

Look at your phone and ask yourself, do you rely on that tiny device for your business dealings? Your important family notifications? Your link to the outside world? If the answer to any of these is “yes” then it is critical you be aware of… Continue reading Your Phone’s Betrayal

Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

Recent research has shown that companies are sacrificing mobile security for expediency and business performance.

The post Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security appeared first on Security Intelligence.

Continue reading Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

How to Fight Mobile Number Port-out Scams

T-Mobile, AT&T and other mobile carriers are reminding customers to take advantage of free services that can block identity thieves from easily “porting” your mobile number out to another provider, which allows crooks to intercept your calls and messages while your phone goes dark. Tips for minimizing the risk of number porting fraud are available below for customers of all four major mobile providers, including Sprint and Verizon. Continue reading How to Fight Mobile Number Port-out Scams