Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Wednesday, May 8, 2019
Tuesday, May 7, 2019
Coming soon - Cybersecurity for 5G
Coming soon - Cybersecurity for 5G
As you might imagine, many industries are gearing up to harness the widely anticipated development of 5G. Although there is much to gain, including better speeds and more consistency, we must also prepare for 5G to usher in its own showcase of security threats.
One of the immediate concerns that rises to the top is how 5G will transform data collection and protection. With fast-moving and highly customized web traffic, new technologies such as IoT devices will be enabled, creating an unmet need in security statistics and metrics.
High-level cybersecurity strategies must adapt to meet these needs, but one maxim still holds true. Hackers will continue to expose the gaps within the infrastructures of small businesses or enterprises, but security providers and solutions will prepare you with the tools to fight back.
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/securing-enterprises-for-5g-connectivity
As you might imagine, many industries are gearing up to harness the widely anticipated development of 5G. Although there is much to gain, including better speeds and more consistency, we must also prepare for 5G to usher in its own showcase of security threats.
One of the immediate concerns that rises to the top is how 5G will transform data collection and protection. With fast-moving and highly customized web traffic, new technologies such as IoT devices will be enabled, creating an unmet need in security statistics and metrics.
High-level cybersecurity strategies must adapt to meet these needs, but one maxim still holds true. Hackers will continue to expose the gaps within the infrastructures of small businesses or enterprises, but security providers and solutions will prepare you with the tools to fight back.
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/securing-enterprises-for-5g-connectivity
Monday, May 6, 2019
In Other News:
In Other News:
Fire sale on the Dark Web: 60,000 digital fingerprints
This week’s Kaspersky Security Analyst Summit revealed a troubling development, even by Dark Web standards.
Kaspersky researchers detailed a new online marketplace where cybercriminals can purchase full digital fingerprints for 60,000 online users. Genesis, the name ascribed to the new marketplace, sells full user profiles for as little as $5. This information helps cyber criminals evade many of the security standards that currently detect abnormal account behavior and can be indicative of fraud.
For instance, a full user profile doesn’t just include login information. It provides thieves with account cookies, browser details, webGL signatures, and other features that allow criminals to evade detection. Data thieves use a Genesis Chrome extension to use the stolen information, something that security researchers have already discovered in the wild.
It’s recommended that people enable two-factor authentication whenever possible to help prevent this scheme from impacting them. At the same time, keeping an eye on our digital information seems even more pertinent than ever. Software solutions like BullPhish ID can help you keep a pulse on your customer and employee data by continuously tracking the “when, where, and what.”
Fire sale on the Dark Web: 60,000 digital fingerprints
This week’s Kaspersky Security Analyst Summit revealed a troubling development, even by Dark Web standards.
Kaspersky researchers detailed a new online marketplace where cybercriminals can purchase full digital fingerprints for 60,000 online users. Genesis, the name ascribed to the new marketplace, sells full user profiles for as little as $5. This information helps cyber criminals evade many of the security standards that currently detect abnormal account behavior and can be indicative of fraud.
For instance, a full user profile doesn’t just include login information. It provides thieves with account cookies, browser details, webGL signatures, and other features that allow criminals to evade detection. Data thieves use a Genesis Chrome extension to use the stolen information, something that security researchers have already discovered in the wild.
It’s recommended that people enable two-factor authentication whenever possible to help prevent this scheme from impacting them. At the same time, keeping an eye on our digital information seems even more pertinent than ever. Software solutions like BullPhish ID can help you keep a pulse on your customer and employee data by continuously tracking the “when, where, and what.”
What We’re Listening To:
Saturday, May 4, 2019
What We’re Listening To:
What We’re Listening To:
Know Tech Talks
Security NowDefensive Security Podcast Small Business, Big Marketing – Australia’s #1 Marketing Show!IT Provider Network – The Podcast for Growing IT Service
TubbTalk – The Podcast for IT Consultants
Risky Business
CHANNELe2e
Security NowDefensive Security Podcast Small Business, Big Marketing – Australia’s #1 Marketing Show!IT Provider Network – The Podcast for Growing IT Service
TubbTalk – The Podcast for IT Consultants
Risky Business
CHANNELe2e
Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Thursday, May 2, 2019
Another Dark Web marketplace shuts down
Another Dark Web marketplace shuts down
The Dark Web, a section of the internet that has become famous for selling illegal drugs, weapons, malware, and other illicit materials, is undergoing a major shakeup. Authorities have already shuttered many of the most prominent marketplaces, culminating in last month’s announcement that Dream Market, the oldest and biggest platform, would close. Now, another major player, Wall Street Market, is ending as well.
According to multiple reports, the website’s admins have “exit scammed” the site’s users, siphoning $14.2 million in user funds into Bitcoin wallets not associated with the marketplace. At the same time, there are reports that customer support staff are blackmailing users who shared their information during customer support requests.
The Dark Web is a nefarious place, and it’s difficult to feel bad for anyone who is scammed when participating in such overtly illegal activities, but the episode is a reminder of the expansive marketplace fueling many cybersecurity vulnerabilities and the extensive demand for security-compromising products.
Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
The Dark Web, a section of the internet that has become famous for selling illegal drugs, weapons, malware, and other illicit materials, is undergoing a major shakeup. Authorities have already shuttered many of the most prominent marketplaces, culminating in last month’s announcement that Dream Market, the oldest and biggest platform, would close. Now, another major player, Wall Street Market, is ending as well.
According to multiple reports, the website’s admins have “exit scammed” the site’s users, siphoning $14.2 million in user funds into Bitcoin wallets not associated with the marketplace. At the same time, there are reports that customer support staff are blackmailing users who shared their information during customer support requests.
The Dark Web is a nefarious place, and it’s difficult to feel bad for anyone who is scammed when participating in such overtly illegal activities, but the episode is a reminder of the expansive marketplace fueling many cybersecurity vulnerabilities and the extensive demand for security-compromising products.
Bit by Bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Wednesday, May 1, 2019
How Will You Handle Ransomware?
How Will You Handle Ransomware?
Ransomware attacks are one of the scariest and most reported cybersecurity threats, and a recent report found that most victims are now prepared to pay the ransom.
The Telstra’s 2019 Security Report surveyed 320 Australian businesses, more than half of which paid ransomware attackers to retrieve their data. Interestingly, 77% of those companies successfully recovered their information after paying the ransom.
In some ways, this is a good thing. Nobody wants to lose their data to hackers. However, it also incentivizes bad actors, making it possible for them to continue victimizing more people. Having a plan to combat and address ransomware is quickly becoming a critical component of any cybersecurity strategy, and it’s one that demands more than just a cache of Bitcoin for a rainy day.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Ransomware attacks are one of the scariest and most reported cybersecurity threats, and a recent report found that most victims are now prepared to pay the ransom.
The Telstra’s 2019 Security Report surveyed 320 Australian businesses, more than half of which paid ransomware attackers to retrieve their data. Interestingly, 77% of those companies successfully recovered their information after paying the ransom.
In some ways, this is a good thing. Nobody wants to lose their data to hackers. However, it also incentivizes bad actors, making it possible for them to continue victimizing more people. Having a plan to combat and address ransomware is quickly becoming a critical component of any cybersecurity strategy, and it’s one that demands more than just a cache of Bitcoin for a rainy day.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Subscribe to:
Posts (Atom)
-
Windows 10 End-of-Life: Why You Must Upgrade Now to Stay Secure and Compliant Microsoft has officially announced the end of support for Win...
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In today’s digital-first world, non-profit organizations are under increasing pressure to secure sensitive data, streamline operations, and ...

