ANCIBE

Noticias Information Security Buzz (English)

Employees Within Hospitality Industry Are The Most Prone To Phishing Attacks
Publicado el: Wednesday June 26, 2019

Today, KnowBe4,  the provider of the world’s largest security awareness training and simulated phishing platform, has released its Phishing By Industry Benchmarking Report 2019 which found, amongst large organisations, those within the Hospitality industry have the highest Phish-Prone Percentage (PPP) of 48 percent and were the most likely to fall victim to a phishing scam. In comparison, employees …

The ISBuzz Post: This Post Employees Within Hospitality Industry Are The Most Prone To Phishing Attacks appeared first on Information Security Buzz.


Oregon DHS Hit By Monumental Phishing Attack, Compromising 645,000 Accounts
Publicado el: Wednesday June 26, 2019

Fox News has released the article, regarding a recent phishing email breach at Oregon DHS, compromising approximately 645,000 accounts.  The email was sent to Oregon’s DHS employees on Jan. 8, 2019. Nine employees opened the email and clicked on a link that allowed the sender to access their email accounts.  The result was exposed data – contained mostly in …

The ISBuzz Post: This Post Oregon DHS Hit By Monumental Phishing Attack, Compromising 645,000 Accounts appeared first on Information Security Buzz.


Trojan Hiding In Attached Microsoft Excel Docs
Publicado el: Tuesday June 25, 2019

Microsoft is drawing attention to a cybercrime campaign that relies on Office features to compromise Windows systems. Earlier this month Microsoft warned that attackers were firing spam that exploited an Office flaw to install a trojan. The bug meant the attackers didn’t require Windows users to enable macros. However, a new malware campaign that doesn’t …

The ISBuzz Post: This Post Trojan Hiding In Attached Microsoft Excel Docs appeared first on Information Security Buzz.


Google Tracking
Publicado el: Tuesday June 25, 2019

Coming up this summer, Google is expected to be introducing a new “auto-delete” tool that will get rid of data and will also be unveiling “Incognito Mode,” to the Google Maps app where users will be able to search locations without being tracked.   Google Map auto delete history your location https://t.co/W8ouPLfPc6 pic.twitter.com/hQL8d9HWyo — @ gamer …

The ISBuzz Post: This Post Google Tracking appeared first on Information Security Buzz.


US Retaliated Against Iranian Spy Group’s Cyberstrike
Publicado el: Tuesday June 25, 2019

It has been reported that the US launched a cyber-attack on Iranian weapons systems on Thursday as President Trump pulled out of air strikes on the country. The cyber-attack disabled computer systems controlling rocket and missile launchers, and is reported to be in retaliation for the shooting down of a US drone as well as …

The ISBuzz Post: This Post US Retaliated Against Iranian Spy Group’s Cyberstrike appeared first on Information Security Buzz.


(ISC)2 Research Report Indicates That Small Businesses May Not Be The Weakest Link In The Supply Chain
Publicado el: Tuesday June 25, 2019

Study reveals that cybersecurity staffing and best practices are bigger factors  than company size in assessing security risk associated with supply chain partners (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today released the findings from its Securing the Partner Ecosystem study, which surveyed more than 700 respondents at both small …

The ISBuzz Post: This Post (ISC)2 Research Report Indicates That Small Businesses May Not Be The Weakest Link In The Supply Chain appeared first on Information Security Buzz.


Ransomware: Why Every Org Is A Bullseye
Publicado el: Tuesday June 25, 2019

Christy Wyatt, CEO at Absolute:  The level of ransomware attacks continue to evolve, and are more sophisticated than ever. Hackers can simply disable security controls and tear down protection against vulnerabilities in their wake. In fact, seventy percent of all breaches are the result of known vulnerabilities that enterprises took too long to patch. Just as startling …

The ISBuzz Post: This Post Ransomware: Why Every Org Is A Bullseye appeared first on Information Security Buzz.


Security Flaw In Dell SupportAssist Tool Puts Millions Of Windows Systems At Risk
Publicado el: Tuesday June 25, 2019

It has been revealed that a Windows support tool bundled with Dell computers has a high-severity security hole that leaves millions of systems at risk of a privilege-escalation attack.  Critical DLL Hijacking Vulnerability in PC-Doctor For Windows Let Hackers Attack Hundreds of Million DELL Computers: A critical DLL hijacking vulnerability resides in PC-Doctor Dell Hardware Support Service …

The ISBuzz Post: This Post Security Flaw In Dell SupportAssist Tool Puts Millions Of Windows Systems At Risk appeared first on Information Security Buzz.


What Can Be Done About The Increasing Authenticity Of Hacked Email Reply Chains?
Publicado el: Tuesday June 25, 2019

Phishing has been around in various forms since the 1990s, however, it’s clear that the popular mode of attack continues to evolve as cybersecurity defences improve. To subvert these improved defences, phishing tactics have become so sophisticated it can be difficult to spot a scam – particularly in the case of hijacked email reply chains. …

The ISBuzz Post: This Post What Can Be Done About The Increasing Authenticity Of Hacked Email Reply Chains? appeared first on Information Security Buzz.


Expert Comments On Android Cryptominer Bot
Publicado el: Tuesday June 25, 2019

A new botnet is abusing Android Debug Bridge (ADB) and SSH to capture & collect new Android devices to its network, according to Trend Micro.  Experts with Juniper Networks and OneSpan offer observations on mobile device vulnerability and what organizations and users can and can’t to improve device security.  Botnet Uses SSH and ADB to Create Android Cryptomining Army #Cryptominer #Botnethttps://t.co/sN705snkKy by …

The ISBuzz Post: This Post Expert Comments On Android Cryptominer Bot appeared first on Information Security Buzz.