Select Page

Cybercrime Targets iOS users and 50,000 Execs

Avast Blog – 12.11.18 (12.7.18)

Two fake apps posing as fitness tools in the Apple App Store — “Fitness Balance” and “Calories Tracker” — used the Apple Touch ID to scam users out of a hundred dollars at a time. The malicious apps prompted users to use their fingerprints to access personal data, then, as the users pressed their fingers against the reader, the app tried to use the fingerprint to charge about $100 from any stored credit cards the user had on file.

Read more: Cybercrime Targets iOS users and 50,000 Execs

Why you should never reuse passwords

Kaspersky Labs Blog – 12.6.18 (12.4.18)

Using one password for everything is convenient, but it’s also dangerously insecure. We examine the case of Mark, a young designer.

Mark is a regular guy. He has e-mail, Facebook, Instagram, Amazon, eBay, Steam, and Battle.net accounts, not to mention ones for another dozen online stores and a forum dedicated to his favorite video game. The accounts are all linked to his e-mail.

Read more: Why you should never reuse passwords

Things of Internet: How smart devices fail because of their Web dependence

Kaspersky Labs Blog – 12.4.18 (12.3.18)

After a long day at work, you’re heading home. You open an app in your smartphone and tap a button on the screen. A dozen miles away, your apartment comes to life. Smart bulbs light up, the smart thermostat starts to heat the room, the smart kettle begins to boil the water for your evening tea. A smart home seems so convenient!

Read more: Things of Internet: How smart devices fail because of their Web dependence

Cryptojacking: The Petty Cyber Crime Hiding a Deadly Threat

Acronis Blog – 11.30.18 (11.28.18)

One of the fastest-growing malware threats of the past 18 months affects half of the businesses in the world, and most of them don’t know it. It’s called cryptojacking, an unintended consequence of the booming popularity of cryptocurrencies like Bitcoin. Most victims don’t notice that they’ve been hit by cryptojacking because its adverse effects are relatively inconsequential: it just steals CPU cycles from your computer, as well as the electricity required to power it.

Read more: Cryptojacking: The Petty Cyber Crime Hiding a Deadly Threat

Acronis True Image 2019 Cyber Protection: Creating the Most Reliable

Acronis Blog – 11.26.18 (11.21.18)

There are few constants in the world. The sun will rise in the east. Rain will fall. Dropped toast will always land buttered-side down. And as quickly as technology advances, the threats to the data we rely on every day evolve as well.

Read more: Acronis True Image 2019 Cyber Protection: Creating the Most Reliable

Holiday shopping and holiday phishing

Kaspersky Labs Blog – 11.26.18 (11.21.18)

November is the first month of the busiest shopping season of the year. It all begins on 11.11, otherwise known as Singles’ Day in China, which has since morphed into one of the largest online (and offline) shopping days in the world, Immediately followed by Black Friday, which falls on November 23rd this year. After that, Christmas and New Year head into view. It’s a great time for shoppers, with discounts and promotions at every turn. The downside to all the juicy offers? Many people drop their guard and become the easy prey of cybercriminals.

Read more: Holiday shopping and holiday phishing

jQuery(document).ready(function($){ $(‘.et-social-icon .icon’).each(function(){ $(this).find(‘a’).attr(‘target’, ‘blank’); }); });