Keeping You and Your Business Safe Online
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
FBI Internet Crime Report 2018 351,936 reported complaints Non-payment / non-delivery Extortion Personal data base breeches
FBI Internet Crime Report 2018 Most financially costly Business email Compromise Romance or Confidence Fraud Investment Scams
The flaw lies in PC- Doctor Toolbox systems analysis software …and pre-installed on PCs made by some of the biggest computer retailers, including Dell, Alienware, Staples and Corsair.
Crippling Ransomware Attacks Targeting US cities on the Rise Targeted ransomware attacks on local US government entities -- cities, police stations and schools -- are on the rise, costing millions Some pay off the perpetrators in an effort to untangle themselves and restore vital systems.
At least 170 county, city or state government systems have been attacked since 2013, including at least 45 police and sheriff's offices. This year, there have been more than 20 reported public-sector attacks.
“the most destructive and costly N.S.A. breach in history”
Malware 1971- Creeper Worm 1974 – Wabbit 1982 – Elk Cloner 1991 – Michelangelo Virus 1999 – Melissa Virus 2000 – ILOVEYOU Worm 2010 – Stuxnet Worm 2017 – WannaCry Ransomware
Malware Infection Symptoms • Near 100% CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing • Crashing • Modified or deleted files
Malware Infection Symptoms • Unwanted advertisements appearing on screen • Strange files, programs or desktop icons • Programs running, turn off or reconfiguring themselves • Strange computer behavior • Emails sent without the users’ knowledge
What happens in the cloud doesn't necessarily stay in the cloud — a lesson that actress Bella Thorne has learned the hard way. "Once you take that picture it goes into the cloud and it's available to any hacker who wants it, and if you don't know that in 2019 that this is an issue, I'm sorry. You don't get to do that." Whoopi Goldberg commenting on Bella Thorne’s leaked nude photos
Mitigation Measures
VPN
The cache (pronounced "cash") is a space in your computer's hard drive and in RAM memory where your browser saves copies of previously visited Web pages. Instead of downloading an image from a recently viewed website, it will load the image from your cache folder, thereby making the browsing process a little quicker.
Clearing Cache
https://myactivity.google.com/
A DNS cache (sometimes called DNS resolver cache) is a temporary database, maintained by a computer's operating system, that contains records of all the recent visits and attempted visits to websites and other internet domains.
Clearing DNS Cache Click “Start” - type the word “Command” in the Start search field. Right-click the command prompt icon and select the option to “Run as Administrator”. In the open prompt, type ipconfig /flushdns You should receive a message of your success as confirmation when the cache is cleared.
“The only privacy that exists is in your own head.”
Phone Number Port-Out Scam 1. Your information is 4. Your phone provider cancels stolen. Whether from your your phone service. mail, online, or you click a malicious link and fill out a 5. Your phone number is ported form. to a new provider. 2. An identity thief finds and buys your PII on a Dark Web marketplace. 6. With your phone number, the identity thief steals your 3. The scammer convinces money and accounts. your phone service that they are you.
https://haveibeenpwned.com
https://www.dehashed.com
https://haveibeenpwned.com/Passwords
You can also read