Top Scam Emails You Should Be Vigilant About

Scam emails have evolved to a point that make it very difficult to tell which are real and which are fake. These days phishing emails are imitating legitimate brands to trick victims into providing credentials over a fake landing page.

Roughly one in four Americans in constantly online.  According to Research, Email Phishing scams this is now the most likely place for identity theft to occur. Often, ID fraud can begin with the wrong click on a scam email.

Now you have been a victim or you want to know the best way to avoid online scams? Rule of thumb is question everything. Even emails from known peers. They may have been hacked and the hacker is sending scam emails in their behalf. We have reviewed the latest email scan types used to date that that just might fool even the most experienced web surfer.

So What Are Most Common

Read the rest

Phishing Campaign Delivers A Double Hitter

A phishing attack is being sent with Word attachments that deliver both the Gandcrab ransomware and Ursnif executable.  This phishing campaign was detected by researchers at Carbon Black, this attack has hit infected systems with a lethal attack combination that harvests credentials, gathers system and process information and afterwards it encrypts data in order to extort payments from victims.

Jared Myers, senior threat researcher for Carbon Black stated “The campaign appears to be ongoing, as we are seeing additional payloads being posted on pastebin.com that are almost identical to the payloads that were leveraged to data extracted from our analysis of these samples.”

The Attack

The initial phishing emails included a Microsoft Word document that delivers the early stages of the attack. “The overall attack leverages several different approaches, which are popular techniques amongst red-teamers, espionage-focused adversaries and large-scale criminal campaigns,” said Carbon Black researchers in a Thursday analysis.

Read the rest

Best Free Antivirus For 2019

So you looking for 2019’s best Free Antivirus Software to Protect Your Computer From Viruses & Malware. Let me give you some details on the best Free Antivirus. Remember Paid AV is always better than free AV.


Bitdefender Antivirus Free Edition

Simple and Easy
Rating: 8/10
Download

Pros: Top protection against malware; super-easy to use; small performance impact
Cons: No customization options; no quick scans or scan scheduling

Bitdefender is minimal and does not take up much resources even during scans.

 Kaspersky Free Antivirus

Lean and mean.
Rating: 8/10
Download

Pros: Excellent malware protection; moderate performance hit; fast scans
Cons: Minimal but has a few extra features  

Kaspersky has some more advanced functions compared to others but during scans it can slow down your computer.

Avast Free Antivirus

Nearly a free suite.
Rating: 7/10
Download

Pros: Loaded with extra features; high customization; VPN client
Cons: Malware protection not great; … Read the rest


DHS Issue Urgent Warning on Domain Name Service Hijacking

The Department of Homeland Security states that some agencies are being targeted by specific attacks that modify the Domain Name System Records, which critical function of the processes to locate websites.

DHS issued an emergency statement giving government agencies 10 days to verify that their DNS records are accurate. There has been a series of incidents where email and website traffic has been redirected.

The DHS’s Cyber Security Team said it “is aware of multiple executive branch agency domains that were impacted by the tampering campaign and has notified the agencies that maintain them,” .

Cyber attacks that target DNS systems can be quite powerful. By modifying a DNS record it can allow an attacker to see traffic flowing to a website or service. They can also craft effective phishing attacks to collect login username and passwords for anything. Hackers can also set a different IP address for the domain … Read the rest


MySQL Design Flaw can be leveraged to steal sensitive information

MySQL has released a security statement providing the following information:

The LOAD DATA statement can load a file located on the server host, or, if the LOCAL keyword is specified, on the client host.

There are two potential security issues with the LOCALversion of LOAD DATA:

  • The transfer of the file from the client host to the server host is initiated by the MySQL server. In theory, a patched server could be built that would tell the client program to transfer a file of the server’s choosing rather than the file named by the client in the LOAD DATA statement. Such a server could access any file on the client host to which the client user has read access. (A patched server could in fact reply with a file-transfer request to any statement, not just LOAD DATA LOCAL, so a more fundamental issue is that clients should
Read the rest

Free vs Paid Antivirus Software: Which Is Better?

Discover the ultimate showdown between free and paid antivirus software. Unveil the pros, cons, and find out which option reigns supreme in protecting your digital world.

Introduction

In today’s digital age, where cyber threats are becoming increasingly sophisticated, protecting your devices and personal information is of utmost importance. Antivirus software plays a crucial role in safeguarding your digital life from malware, viruses, and other malicious activities. When it comes to antivirus software, users often find themselves faced with the choice between free and paid options. This article aims to explore the differences between free and paid antivirus software, helping you make an informed decision to ensure optimal cybersecurity.

Are you seeking antivirus protection but hesitant to invest in paid software? Well, let me share some eye-opening facts: According to the Center for Strategic and International Studies, hacking costs the global economy a staggering 350 billion dollars annually. It’s crucial … Read the rest


Critical Cisco SMB Switch Vulnerability

This Critical Cisco vulnerability affects the following: Cisco Small Business 200 Series Smart Switches, 250 Series Smart Switches, 300 Series Managed Switches, 350 Series Managed Switches, Cisco 350X Series Stackable Managed Switches, 500 Series Stackable Managed Switches and 550X Series Stackable Managed Switches.

The vulnerability (CVE-2018-15439), which has a critical base severity rating of 9.8 because the default configuration on the devices includes a default, privileged user account that is used for 1st time login and cannot be removed from the switch. The administrator can disable the account by configuring another admin account with access privilege set to level 15. If any of the previous created admin accounts are removed it re-enables the default privileged admin account without any notification.

“Under these circumstances, an attacker can use this account to log in to an affected device and execute commands with full admin rights,” Cisco explained in its advisoryRead the rest


The Best Business Antivirus for 2019

Are you switching to a new Antivirus provider? I have done some leg work to vet the following antivirus programs below. These business antivirus have the best features, such as remote installation and central management. The best business antivirus software will have enterprise-level protection against threats and many new features. I also took into consideration the best bang for the buck. 


 

Webroot SecureAnywhere
An excellent business antivirus suite, giving you various tools such as virus protection,  Firewall, Identity Theft Protection, Secure Browsing with real time anti phishing, password and login protection, Mobile Security and system optimizer.

Bitdefender GravityZone Business Security
This package makes reliable protection its top priority. Bitdefender products are loved by the independent testing labs, highly rated for malware detection, removal, performance and usability. Most of the features work automatically – anti-malware, firewall, web adviser, URL filtering – but you can also customize the product to control user … Read the rest


773M Credentials Found on the Dark Web

A database called Collection #1 has 773 million breached emails addresses has been found in a underground hacking forum. To date this is the largest sum of compromised accounts to year.

This database in size totals 87GB of data, it was seen being hosted on the MEGA cloud service but instantly removed after it was discovered. The data was split into 12,000 separate text files under a folder called “Collection #1” Even after the database was removed from MEGA Cloud it was instantly turned up in the Dark Web.

Check Your Email Addresses and Passwords in HIBP

Please do yourself a favor and go to https://haveibeenpwned.com/. This website will allow you to search a database hosted by HIBP that contains all the email’s and unique password’s that have ever been leaked into the dark web. 

Read the rest

SonicWall Tutorials

Fix slow internet speed with Intel Wireless-AC 7265 – 8265 when Sonicwall VPN enabled

Fix slow internet speed with Intel Wireless-AC 7265 – 8265 when Sonicwall VPN software is enabled and not even connected to the VPN destination. There is a glitch with the Sonicwall GVC 4.9 software running in Windows 10 version 1803 where when the software is enabled download speeds on the Intel Dual Band Wireless-AC 7265 – 8265 are super slow. To fix this issue you will need to obtain the Sonicwall GVC ( Global VPN Client ) Ver: 5.0 you can do this by opening a support ticket and requesting the installer or downloading it from the provided link.

I hope this article was helpful, if you have any questions, please feel free to contact me. If you would like to be notified of when I create a new post, you can subscribe to my blog alert.

An easy way to contribute to my blog would be to click

Read the rest

Stay Informed

Receive instant notifications when new content is released.