Tuesday, May 7, 2019

Coming soon - Cybersecurity for 5G

Coming soon - Cybersecurity for 5G

As you might imagine, many industries are gearing up to harness the widely anticipated development of 5G. Although there is much to gain, including better speeds and more consistency, we must also prepare for 5G to usher in its own showcase of security threats.

One of the immediate concerns that rises to the top is how 5G will transform data collection and protection. With fast-moving and highly customized web traffic, new technologies such as IoT devices will be enabled, creating an unmet need in security statistics and metrics.

High-level cybersecurity strategies must adapt to meet these needs, but one maxim still holds true. Hackers will continue to expose the gaps within the infrastructures of small businesses or enterprises, but security providers and solutions will prepare you with the tools to fight back.

https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/securing-enterprises-for-5g-connectivity

Monday, May 6, 2019

In Other News:

In Other News:

Fire sale on the Dark Web: 60,000 digital fingerprints

This week’s Kaspersky Security Analyst Summit revealed a troubling development, even by Dark Web standards.

Kaspersky researchers detailed a new online marketplace where cybercriminals can purchase full digital fingerprints for 60,000 online users. Genesis, the name ascribed to the new marketplace, sells full user profiles for as little as $5. This information helps cyber criminals evade many of the security standards that currently detect abnormal account behavior and can be indicative of fraud.

For instance, a full user profile doesn’t just include login information. It provides thieves with account cookies, browser details, webGL signatures, and other features that allow criminals to evade detection. Data thieves use a Genesis Chrome extension to use the stolen information, something that security researchers have already discovered in the wild.

It’s recommended that people enable two-factor authentication whenever possible to help prevent this scheme from impacting them. At the same time, keeping an eye on our digital information seems even more pertinent than ever. Software solutions like BullPhish ID can help you keep a pulse on your customer and employee data by continuously tracking the “when, where, and what.”


What We’re Listening To:

Thursday, May 2, 2019

Another Dark Web marketplace shuts down

Another Dark Web marketplace shuts down 

The Dark Web, a section of the internet that has become famous for selling illegal drugs, weapons, malware, and other illicit materials, is undergoing a major shakeup. Authorities have already shuttered many of the most prominent marketplaces, culminating in last month’s announcement that Dream Market, the oldest and biggest platform, would close. Now, another major player, Wall Street Market, is ending as well.

According to multiple reports, the website’s admins have “exit scammed” the site’s users, siphoning $14.2 million in user funds into Bitcoin wallets not associated with the marketplace. At the same time, there are reports that customer support staff are blackmailing users who shared their information during customer support requests.

The Dark Web is a nefarious place, and it’s difficult to feel bad for anyone who is scammed when participating in such overtly illegal activities, but the episode is a reminder of the expansive marketplace fueling many cybersecurity vulnerabilities and the extensive demand for security-compromising products.


Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Wednesday, May 1, 2019

How Will You Handle Ransomware?

How Will You Handle Ransomware?

Ransomware attacks are one of the scariest and most reported cybersecurity threats, and a recent report found that most victims are now prepared to pay the ransom.

The Telstra’s 2019 Security Report surveyed 320 Australian businesses, more than half of which paid ransomware attackers to retrieve their data. Interestingly, 77% of those companies successfully recovered their information after paying the ransom.

In some ways, this is a good thing. Nobody wants to lose their data to hackers. However, it also incentivizes bad actors, making it possible for them to continue victimizing more people. Having a plan to combat and address ransomware is quickly becoming a critical component of any cybersecurity strategy, and it’s one that demands more than just a cache of Bitcoin for a rainy day.


Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com

Did you fall into the 28 Billion??