Category Archives: Internet Security

What Is Zero Trust? A Guide to the Cybersecurity Approach – Government Technology

The term zero trust is rapidly gaining attention as agencies move away from the more traditional castle and moat models of cybersecurity.

Zero trust refers to a cybersecurity strategy or set of principles based in the understanding that just because an account or device is associated with the organization or has seemed trustworthy in the past doesnt mean they should be assumed to be trustworthy in the future. The mindset assumes an attacker could be in the network already and emphasizes limiting a bad actors ability to access data and other resources.

Organizations adopting zero-trust principles require users and devices to continually prove they are who they claim to be, whenever they want to access data or services. This stands in contrast to older thinking in which users may have only had to authenticate themselves once to enter the organizations network, such as by logging in, and then were granted access to a wide swathe of internal resources.

Core zero-trust principles also involve restricting users access privileges to the minimum amount they need to do their jobs, something known as the principle of least privilege (POLP).

But many of todays organizations rely on workforces that are no longer on premise and on assets stored in the cloud meaning theres no longer a castle to wrap the moat around. Remote employees connect to the network from a variety of locations, through personal Internet networks and, sometimes, on personal devices outside of an organizations control. Cloud-based data also remains outside of the defense of the organizations perimeter firewalls.

Malicious actors can attempt to pass themselves off as employees using new devices or may seize control of employees accounts or devices that are already familiar to the organization, then move within the network.

Organizations need to avoid locking out legitimate employees, but enabling the wrong device or allowing the wrong level of access privileges creates significant cyber risks.

To thread the needle, organizations that adopt the zero-trust approach require devices and users to verify themselves repeatedly and monitor continually. Reducing each accounts privileges to only what is essential also minimizes the damage that a bad actor or malicious insider would be able to achieve.

The federal government has thrown its support behind the idea, with Bidens executive order asking federal agencies to transition to zero trust.

The National Institute of Standards and Technology (NIST) outlines seven tenets in a 2021 draft white paper and 2020 publication:

1. Network identity governance: Organizations need policies and tools to ensure that only authorized users who have gone through a sufficient level of authentication are granted access to enterprise data and services, and that they are only able to perform authorized actions.

2. Secure end devices: Zero-trust plans need to address end devices such as mobile devices, remote sensors and compute resources.

3. Monitor, defend and defend against owned and associated assets: Organizations should attend closely to their data and services defenses including understanding how they are configured and maintained as well as continually monitor for signs of compromise and respond quickly to events like new patches or indicators of vulnerabilities. They may also need to block connections or restrict access to those devices over which they have less control.

4. Secure all communication: Organizations must safeguard the integrity and privacy of all data in transit even for communications within the network. Otherwise, an attacker hiding on the network could view or tamper with the communications.

5. Users should only be given access to individual enterprise resources on a per-session basis: Organizations should try to tightly control access to data, services and devices. To the extent possible, organizations should require users to clear authentication and authorization checks each time they seek to perform unique operation[s]. Users also should only be given the minimum access privileges required to complete their objectives. Adopting logging, backups and versioning tools can also help recovery if unauthorized activity does occur.

6. Thoroughly and dynamically vet access requests: Limit access to enterprise resources only to members of an allow-list who also both prove their identities and their genuine need to access the particular asset in question. Identities should be verified in robust ways. Organizations may continually monitor accounts and devices for suspicious behaviors and characteristics as well as require MFA to access some systems or data and require reauthentication at various points.

7. Gather information to understand and improve security posture: Organizations should collect and analyze as much data as they can about the status of their assets, network infrastructure and communications to help them identify ways to improve policies.

More here:
What Is Zero Trust? A Guide to the Cybersecurity Approach - Government Technology

How AVGs internet security can help protect your business and let you get on with the important stuff – The Independent

For small business owners, their computing devices and IT setup is at the very heart of what they do.

Thats one of the most powerful developments to have come to small businesses. Recent advances in computing and connectivity mean that we can do more than ever, more quickly than ever, collaborating and connecting over continents instantly.

With those advances, it is probably impossible to imagine a business that hasnt been fundamentally transformed or just couldnt exist without those devices and network connections.

But with that power comes responsibility. For all that we rely on our computers and connections, the danger they could be attacked just increases and the more central to our lives those devices are, the more devastating any attack can be.

Each year, online threats costs businesses time, effort and money. Even if you are not the victim of a cyber attack, you could be at any time, and the worry itself can be a major expense.

AVG Business edition: a reliable solution for small and medium businesses

(AVG)

Thats why AVG offers rigorous and reliable solutions to make sure that small and medium businesses are properly protected from the various threats online. It means you can stop worrying about whether your devices are safe and get on with using them for the work they are really for.

AVG is a pioneer in cyber security, and offers a host of protection, performance and privacy products to both consumer and businesses. It helps people to ensure they can streamline and protect their IT setups and systems, protecting them from ransomware, malware, hackers and the variety of other dangerous threats that await online.

It comes in three packages for businesses: AVG File Server Business Edition, AVG AntiVirus Business Edition, AVG Internet Security Business Edition. That ensures you can get everything you need to protect your businesses, and only pay for what is really necessary.

Get 20% off 1 year of AVG Internet Security Business Edition for 35.07

A range of tools for every business

(AVG)

Whats more, AVGs tools are built for small businesses, ensuring that they are designed precisely to keep you protected and safe.

AVG Antivirus business edition comes packed with a variety of tools to protect your business. There is a whole terrifying host of threats out there and, thankfully, an impressively vast set of features inside the AVG system to ensure you are protected from them.

With its cloud management tools, for instance, you can look after your network and devices from on location. Its file, email, web and behaviour shields watch over computers to ensure that it can spot dangerous links or files to ensure that they are not able to find their way into your network.

It amounts to a comprehensive guard for the people in your business, tracking known threats and scanning your devices to ensure they have not found their way in.

The company also offers 24 hour English support throughout the working day, meaning that youll be able to get access to experts whenever you need them, with just a phone call.

Get 20% off 1 year of AVG Internet Security Business Edition for 35.07

All the protection you need under one subscription

Whats more, because you just need to buy one subscription, your system is always updated and improved automatically and reliably. You dont have to wait for big releases but instead youll always be kept up to date, with AVG keeping you safe against even the newest known threats.

AVG also offers AVG Internet Security Business Edition. That adds protection for passwords that are saved in browsers, and importantly also includes tools to protect people when they use Microsoft Exchange scanning emails to look whether they include suspect attachments, spam and links, and alerting users to ensure they dont expose themselves.

If youd like a simpler and more value form of protection, AVG also offers its File Server package, which represents a great place to start. That gives you access to all of the companys key systems including checking through unknown files, managing your devices, protection from ransomware and that same free phone support at an even more accessible price.

Whichever you choose, you can ensure that all of your devices are always protected against the very latest threats, wherever they are coming from letting you get on with the fun stuff.

Get 20% off 1 year of AVG Internet Security Business Edition for 35.07

For more information and offers on AVG Business Edition head over to avg.com/business-security

Excerpt from:
How AVGs internet security can help protect your business and let you get on with the important stuff - The Independent

Are Macs safer than Windows laptops? We asked the experts – TrustedReviews

When it comes to getting a new laptop, many of us have a favourite operating system. But, which platform is actually the safest Mac or Windows?

We spoke to several security experts to get an idea of how vulnerable each platform is, what attacks you need to watch out for and how to keep your device safe no matter which one you use. Heres what we found out.

Fennel Aurora, security advisor at F-Secure told Trusted Reviews, while it can feel wrong to think of hacking and distributing malware as a business, thats essentially what it is, and like any business, it all comes down to profit.

Cyber criminals are doing cost-benefit analyses on where to use their R&D resources, just like any normal company would, explained Aurora.

Where is the biggest market? Which market segment has the most people willing to pay? Which market is easiest to enter? Which market has the most competition?

Chris Hauk, consumer privacy champion at Pixel Privacy, add that right now the largest and easiest market to for hackers to enter is still Windows.

Windows machines are generally targeted much more than Macs, simply due to their sheer numbers, explained Hauk.

Targeting Windows machines provides more bang for the buck. However, thanks to its improved sales in recent years, the Mac platform is becoming a more attractive target for bad actors.

Antony Demetriades, VP at McAfee added that despite this, Apple users should be careful not to get too comfortable.

Many users have believed Macs to be untouchable by hackers, giving Apple devices a reputation for being more secure than other PCs, including Windows, said Demetriades.

But Macs are also vulnerable to viruses and have security measures that can be susceptible to fraudsters.

Aurora backed up Demetriades assertion adding that, in many instances, Mac users are considered the more desirable victims.

In general iOS and Mac users are more valuable targets and can be more profitable if the crime company is able to put in the effort to develop more complex malware, said Aurora.

These targets are generally profitable either from the generally richer users paying up for ransomware, or by working for governments and corporations with deep pockets behaving criminally to target protesters, journalists, opposition leaders, union organizers, whistleblowers, and anyone else inconvenient to their continuing abuses of power.

Kaspersky Total Security Now 50% off

Total protection in one product

Add additional security with award-winning protection against hackers, viruses and malware. Includes, Free VPN, Password Manager and Kaspersky Safe Kids. Now 50% off from just 19.99 per month

Paul Bischoff, privacy advocate at Comparitech told Trusted Reviews, the issue for Windows lies in how widespread the OS has become. This makes it a challenge for Microsoft to monitor for vulnerabilities across such a large range and number of devices.

Mac is probably more secure on the whole because Apple is in full control of both the hardware and software, whereas Windows has to be adapted to many different brands and models, explained Bischoff.

That, on top of the fact that fewer people own Macs, creates more gaps in Windows cybersecurity that are discovered more quickly.

F-Secures Aurora added that Apples marketing around security means that, while Macs can be more secure, its important users dont get overly complacent especially considering the higher value placed on hacking Apple devices.

Macs are generally more secure than Windows machines to start, and because of that people are often encouraged to be complacent around installing security software and other monitoring, and there is less competition from other criminals, warned Aurora.

Demetriades agreed, adding:

While Apple goes to great lengths to protect all its devices, this doesnt make your Mac immune to computer viruses, Whether hackers physically sneak onto your device or scam you via apps, sketchy websites or phishing attacks, viruses and malware can create several problems.

David Emm, principal security researcher at Kaspersky told Trusted Reviews, while it can be easy to just tell people not to click dodgy links, many cybercriminals will put in the effort to disguise their attacks as trusted websites or exciting opportunities.

Common threats can include keyloggers that expose your passwords, crypto-mining software that takes advantage of your computers power to mine crypto-currencies and Trojan malware that performs data-stealing attacks while hiding in plain sight.

Most malware, for whatever platform, relies on social engineering, i.e. tricking someone into doing something that jeopardises their security, Emm explained

Hence the number of phishing attacks designed to try and persuade people to click on links to fake sites hosting malware (this could be adware, a banking Trojan designed to steal their money, malicious crypto-currency miners or any other type of malware) or capturing personal information such as passwords.

Aurora agreed with Emm adding that cyber scams are, in their essence, just that scams. Many criminals will use the same marketing tactics used by scammers offline, too.

A lot of avoiding scams comes down to taking a breath and pausing when you feel yourself being pressured or suddenly excited by a too-good-to-be-true opportunity, explained Aurora.

This applies to websites your visit, emails you receive, text messages, social media, phone calls, and even while outside face-to-face. Scammers find you where you are and try to use things that are familiar to you to gain your confidence.

Kaspersky Total Security Now 50% off

Total protection in one product

Add additional security with award-winning protection against hackers, viruses and malware. Includes, Free VPN, Password Manager and Kaspersky Safe Kids. Now 50% off from just 19.99 per month

There are a few steps you can take to ensure your devices stay protected and reduce your risk of being the target of cyber scams.

The obvious one is to install antivirus software. You can find a rundown of our favourites in our best antivirus guide, but our current top pick is Kaspersky Internet Security for its excellent performance and handy feature set.

Its also a good idea to invest in a VPN to protect your data while surfing online. You can see the best VPN services weve tested in the attached guide.

Our experts also had the following advice to share.

Apply updates to operating systems and applications and back-up your data regularly. Think PUB protect, update, backup, said Emm.

Although its age-old advice, avoid suspicious emails or messages from unknown senders. Hackers often use phishing emails or text messages as a means to distribute malware, so do not open suspicious links, said Demitriades.

Emm advises users to avoid responding to unsolicited messages and to only use trusted sites: Use https and always type in the address yourself (or use bookmarks/favourites) rather than click on links, he warned.

Aurora, meanwhile, recommends registering for a password manager to keep tabs on unique passwords.

This is the only way to have a unique strong password on every account, meaning that even if one account is hacked, the damage is contained to that one account, explained Aurora.

In addition, the autofill and synchronization of passwords across devices that you get with good password managers means its easier to use every day than trying to remember and type out your passwords.

Aurora also advises users to switch on Multi-Factor Authentication (MFA/2FA) when available especially when it comes to your email.

If possible, use an app like FreeOTP or a USB hardware device like Yubikey instead of your phone number with SMS. And save those backup codes in your password manager. If you can only do SMS, please still do that, it is better than nothing, he said.

Regardless of whether youre Team PC or Team Mac, its important to understand that both are susceptible to cyberthreats which are constantly changing, concluded Demitriades.

Read more:
Are Macs safer than Windows laptops? We asked the experts - TrustedReviews

FBI Denver Tech Tips: Protecting Against the Risk of Ransomware FBI – Federal Bureau of Investigation

(DENVER, CO) As the premier cyber investigative agency, the FBI works to keep Americans safe online. During 2022, FBI Denver will focus on cyber security issues impacting Colorado and Wyoming residents.

This month, ransomwarewhat it is and how to lessen the likelihood youll fall victimis our focus. Ransomware is malicious software that blocks access to a computer system or files until a ransom or monetary amount is paid.

The FBI Denver Division urges Colorado and Wyoming businesses to stay vigilant against bad actors by putting plans in place to protect their business from an increase in ransomware attacks. The FBI does not encourage paying a ransom to criminals, as it only serves to embolden these adversaries and fund their illicit activities. Paying a ransom does not guarantee that a victims files will be recovered.

Common techniques utilized by criminals to infect victims with ransomware include the following:

Recent ransomware attacks in Colorado and Wyoming have targeted health care providers, small businesses, and local water treatment facilities. To avoid a ransomware attack, follow these strategies:

If you or your business becomes a victim of a ransomware attack, notify the FBIs Internet Crime Complaint Center (www.ic3.gov) or contact FBI Denver at 303-629-7171.

See the rest here:
FBI Denver Tech Tips: Protecting Against the Risk of Ransomware FBI - Federal Bureau of Investigation

British firms warned to bolster cyber defences against threat of new Russian attacks – Sky News

Britain's cyber security centre has urged UK organisations to check their cyber defences because of concern about the potential for new Russian cyber attacks linked to tensions with Ukraine.

The public-facing arm of the spy agency GCHQ encouraged everyone to read new guidance published on its website entitled: "Actions to take when the cyber threat is heightened."

Paul Chichester, director of operations at the National Cyber Security Centre (NCSC), said: "While we are unaware of any specific cyber threats to UK organisations in relation to events in Ukraine, we are monitoring the situation closely and it is vital that organisations follow the guidance to ensure they are resilient.

"Over several years, we have observed a pattern of malicious Russian behaviour in cyber space. Last week's incidents in Ukraine bear the hallmarks of similar Russian activity we have observed before."

Ukraine was hit on 14 January by what Ukrainian officials described as a "massive cyber attack" that targeted some 70 government websites.

Oleksiy Danilov, the top security adviser to Ukraine's president, told Sky News at the time that he was 99.9% sure Russia was behind the assault.

The Kremlin has denied the claim.

Please use Chrome browser for a more accessible video player

Officials from the NCSC are "urgently" helping the Ukrainian government investigate the attack and discover who was behind it.

The cyber offensive unfolded as Russia amasses more than 100,000 troops and weaponry close to Ukraine's borders.

The military mobilisation has prompted fears in Western capitals of a new Russian invasion of its neighbour - eight years after President Vladimir Putin annexed Crimea and backed separatists in the east.

The NCSC said in a statement on Friday: "While the government is not attributing responsibility for the recent cyber incidents in Ukraine, the NCSC is urgently investigating them.

"Incidents of this nature are similar to a pattern of Russian behaviour seen before in previous situations."

This included a global cyber attack in 2017 that cost businesses around the world hundreds of millions of pounds.

Read more:Kyiv mayor Vitali Klitschko criticises Germany over lack of support for UkraineHow many NATO troops are ready if Russia launches new invasion?Inside the top-secret tank base that provides Ukraine's best hope of defence

The UK has previously accused Russian military intelligence of launching the NotPetya attack against government IT systems in Ukraine.

The malware then spread across 64 other countries, including the UK.

Please use Chrome browser for a more accessible video player

Cyber hostilities are a form of attack that can take place in a grey zone under the threshold of war or as part of a physical, military invasion.

The new NCSC warning appears designed to try to ensure British companies and other organisations are better prepared in case another cyber attack against Ukraine then infects the internet worldwide.

It is a sign of how a conflict in one part of the world can impact anyone, anywhere because cyber weapons do not respect geographical boundaries.

The "guidance encourages organisations to follow actionable steps that reduce the risk of falling victim to an attack", the cyber centre said.

Follow the Daily podcast on Apple Podcasts, Google Podcasts, Spotify, Spreaker

These actions are listed on its new guidance, which was published last week - three days after the cyber attack against Ukrainian government websites became public.

They include things like patching systems;enabling multifactor authentication;and checking that backups and restore mechanisms are working.

Any organisation that falls foul of a cyber attack is advised to report the incident to the NCSC.

Originally posted here:
British firms warned to bolster cyber defences against threat of new Russian attacks - Sky News

Internet Society condemns UK’s Online Safety Bill for demonising encryption using ‘think of the children’ tactic – The Register

Britain's controversial Online Safety Bill will leave Britons more exposed to internet harms than ever before, the Internet Society has said, while data from other countries suggests surveillance mostly isn't used to target child abusers online, despite this being a key cited rationale of linked measures.

Government efforts to depict end-to-end encryption as a harm that needs to be designed out of the internet as it exists today will result in "fraud and online harm" increasing, the Internet Society said this week.

Founded by Vint Cerf and Bob Kahn, the Internet Society is one of the oldest and most well-respected institutions guiding the path of the public internet today. Its cry against the draconian Online Safety Bill (aka Online Harms Bill) should cause policymakers to sit up and pay attention.

Robin Wilton, the society's director of internet trust, said in a statement: "Today, encryption is an essential component of digitally connected objects like cars, doorbells, home security cameras and even children's toys, otherwise known as the 'Internet of Things' (IoT). It's also essential for national security by protecting highly sensitive systems like the power grid, citizen databases, and financial institutions such as the stock market."

Government has been explicit about wanting to ban end-to-end encryption, co-opting willing and eager police forces into a public campaign demonising the safety and security technology.

The Internet Society's Wilton rubbished these calls, saying: "Despite having access to the world's leading cryptographic expertise, the government has been unable to suggest a credible, safe back door that meets their requirements because it does not exist. Instead, the government is trying to make companies design insecurity in by default."

Quoting government publicity around the Online Harms Bill, he added: "That is not the way to 'harness the benefits of a free, open and secure internet', it's a recipe for fraud and online harm."

"It prevents spies, terrorists and hostile governments from accessing and exploiting confidential communications of government officials, and protects highly sensitive systems intrinsically tied to national security, including the power grid, databases, and financial institutions, from being hacked," he concluded.

Meanwhile, more figures emerged tending to show that online surveillance tends to be used by Western governments against drugs gangs rather than child abusers, despite the Online Safety Bill and police campaigns claiming end-to-end encryption (E2EE) will turn social media into a paedophiles' paradise.

Encrypted email firm Tutanota, headquartered in Germany, published research this week suggesting surveillance orders are deployed to target drugs offenders first and foremost.

"Most orders issued to telecommunications providers are in connection with drug offences," Tutanota told The Register. Looking at published data, the company said about 80 per cent of wire-tapping orders granted in the US, one of the more heavily surveilled Western countries, were for drug-related crimes.

"In recent years, child sexual abuse and child pornography have played only a marginal role in telecommunications surveillance in practice," blogged Tutanota founder Matthias Pfau.

The same held true in Germany, where a specifically broken-out category of warrants granted for child abuse image offences made up just 0.2 per cent of surveillance applications for 2019 having remained at that insignificant level for 10 years.

In snoop-happy Australia the situation was only slightly different, with warrants granted under that country's Telecommunications Interception Access Act 1979 being 50 per cent focused on drugs: in 2020 surveillance against child abuse imagery offenders made up just 0.4 per cent of applications, said Tutanota.

"The UK Home Office unfortunately does not provide figures on this," added Pfau, but there is little reason to assume the UK is much different from its sister democracies.

The Online Harms Bill continues its Parliamentary journey.

See the original post here:
Internet Society condemns UK's Online Safety Bill for demonising encryption using 'think of the children' tactic - The Register

The Week in Ransomware – January 28th 2022 – Get NAS devices off the Internet – BleepingComputer

It's been a busy week with ransomware attacks tied to political protests, new attacks on NAS devices, amazing research released about tactics, REvil's history, and more.

This week's biggest news is about a new ransomware operation called DeadBolt encrypted QNAP devices worldwide, illustrating how threat actors can still earn a lot of money by targeting consumers and small businesses.

The attacks started on January 25th and have since encrypted over 4,300 QNAP NAS devices where they demand 0.03 bitcoins, worth approximately $1,100, for a decryption key.

Unfortunately, many victims have reported paying, leading this attack to be very successful for the threat actors.

Other attacks this week include a Conti attack on Apple and Tesla contractor Delta and an attack on Belarusian Railway in protest of Russia using Belarusian Railway's rail transport network to move military units and equipment into the country.

Other interesting stories this week are ransomware gangs calling people whose data was stolen, an increase in attempts to recruit insiders, the analysis of LockBit's ESXI encryptor, and a fantastic report detailing the history of REvil.

Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @Ionut_Ilascu, @demonslay335, @BleepinComputer, @VK_Intel, @malwareforme, @struppigel, @fwosar, @FourOctets, @billtoulas, @Seifreed, @malwrhunterteam, @jorntvdw, @DanielGallagher, @LawrenceAbrams, @serghei, @kevincollier, @Jon__DiMaggio, @UseAnalyst1, @fbgwls245, @JakubKroustek, @pcrisk, @TrendMicro, @Hitachi_ID, @emsisoft, @BushidoToken, @SteveD3, @SttyK, @CuratedIntel, and @vinopaljiri.

dnwls0719 found a new Paradise .NET variant that appends the .iskaluz extension to encrypted files.

A recent survey of 100 large (over 5,000 employees) North American IT firms shows that ransomware actors are making greater effort to recruit insiders in targeted firms to aid in attacks.

A group of hackers (known as Belarusian Cyber-Partisans) claim they breached and encrypted servers belonging to the Belarusian Railway, Belarus's national state-owned railway company.

Jakub Kroustek found a new STOP ransomware variant that appends the .qqqw extension.

A new DeadBolt ransomware group is encrypting QNAP NAS devices worldwide using what they claim is a zero-day vulnerability in the device's software.

Wayne didnt know his sons school district had been hacked its files stolen and computers locked up and held for ransom until last fall when the hackers started emailing him directly with garbled threats.

The Belarusian Cyber Partisans have shared documents related to another hack, and explained that Curated Intel member, SttyK, would understand some of the methods used.

dnwls0719 found a new ransomware appending the .exploit extension to encrypted files.

QNAP is warning customers again to secure their Internet-exposed Network Attached Storage (NAS) devices to defend against ongoing and widespread attacks targeting their data with the new DeadBolt ransomware strain.

LockBit is the latest ransomware gang whose Linux encryptor has been discovered to be focusing on the encryption of VMware ESXi virtual machines.

dnwls0719 found a new Babuk knockoff appending the .king extension to encrypted files.

Delta Electronics, a Taiwanese electronics company and a provider for Apple, Tesla, HP, and Dell, disclosed that it was the victim of a cyberattack discovered on Friday morning.

In our previous research we investigated a ransom cartel, and then we conducted a study on ransomware gangs and their links to Russian intelligence organizations. Now, we are conducting a use case into one of the worlds most notorious ransomware gangs, REvil. This particular case is fascinating because the gang has existed for several years, conducted many high-profile attacks, inspired several spin-off gangs, and in the end, caused major turmoil among partnering hackers who supported them.

dnwls0719 found a new MeduaLocker ransomware variant that appends the .farattack extension to encrypted files.

QNAP force-updated customer's Network Attached Storage (NAS) devices with firmware containing the latest security updates to protect against the DeadBolt ransomware, which has already encrypted over 3,600 devices.

Emsisoft has released a decryption tool for DeadBolt, but users will still need to obtain a decryption key by paying the ransom.

PCrisk found two new STOP ransomware variants that append the .qqqe or .yoqs extensions.

Jir Vinopal found a new ransomware that was created by the Thanos builder that appends the .NARUMI extension.

Read more:
The Week in Ransomware - January 28th 2022 - Get NAS devices off the Internet - BleepingComputer

Tech Crunch Tuesday: VPNs and bad guys – NEWS10 ABC

How cyber criminals are using virtual private networks to spread malware undetected

by: Ryan Peterson

ALBANY, N.Y. (NEWS10) Virtual Private Networks (VPN), theyre nothing new, but in this pandemic era with more and more people telecommuting, they have certainly become more familiar to many of us. VPNs allow internet users to browse the web while keeping their identities and locations hidden, which is why theyre so popular with companies to set up corporate, home-working networks. But, as Curtis Dukes, Executive Vice President and General Manager at the Center for Internet Security tells us, its also an attractive tool for criminals looking to cover their cyber tracks.

It hides where their physical location is. It will also encrypt the data that theyre exfiltrating, once theyve gotten access to your corporate assets, Dukes said.

Police in Germany and nine other countries recently took down a VPN service that was helping cybercriminals spread malware undetected.

Dukes says, In this country, and I would say, globally, ransomware is a huge problem and has been for two-plus years. VPNs enable criminal networks to pursue ransomware attacks on organizations as well as individuals.

As long as a VPN is being used for legitimate purposes, you have nothing to worry about. The technology itself doesnt pose any direct danger to you. Like many things, it can serve a dual purpose depending on the users intent.

Read this article:
Tech Crunch Tuesday: VPNs and bad guys - NEWS10 ABC

Global Internet Security Firewall Market 2021 Emerging Players, Growth Analysis And Precise Outlook 2027 The Oxford Spokesman – The Oxford Spokesman

It offers an excellent mixture of business operations, advanced technologies, policy solutions, and the latest technology to provide a better user experience. MarketsandResearch.biz has just launched a worldwide study report entitled Global Internet Security Firewall Market from 2021 to 2027. Market segmentation is based on forms, functions, end-users, and regions to provide such a detailed understanding of the markets growth potential.

A study of production and consumption, as well as the presence of key players in this industry, are also included in the report, as are statistics on growth in the financial industry. Revenue margin, price, rotation, and gross margin are all estimated.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/195856

Major key vendors/industry manufacturers include:

SAP, Hewlett Packard Enterprise, Cellusys, Openmind Networks, Tata Communications, ANAM Technologies, AMD Telecom, Adaptive Mobile, Infobip, EVOLVED INTELLIGENCE, MOBILEUM, OMOBIO

There is an examination of the market shares and growth potentials for each product category as well as for each sector. There is also a forecast of the markets size for the period from 2021 to 2027. The analysis shows that the global marketplace for Internet Security Firewall is expected to grow rapidly in the future, based on the present patterns.

Market segmentation by type:

Cloud-Based, On-Premise

Market segmentation by application:

Small and Medium Enterprise, Large Enterprise

Regions and countries mentioned in the global Internet Security Firewall market report:

North America (United States, Canada and Mexico), Europe (Germany, France, United Kingdom, Russia, Italy, and Rest of Europe), Asia-Pacific (China, Japan, Korea, India, Southeast Asia, and Australia), South America (Brazil, Argentina, Colombia, and Rest of South America), Middle East & Africa (Saudi Arabia, UAE, Egypt, South Africa, and Rest of Middle East & Africa)

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/195856/global-internet-security-firewall-market-2021-by-company-regions-type-and-application-forecast-to-2026

An in-depth assessment of the proposed market landscape is offered in the report. The study also provides a detailed analysis of general main trends, threats, and difficulties that appear to have a significant impact on the creation of income in the industry. Industry growth predictions for Internet Security Firewall were created using quantitative and real worth methods.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team (sales@marketsandresearch.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@marketsandresearch.bizWeb: http://www.marketsandresearch.biz

The rest is here:
Global Internet Security Firewall Market 2021 Emerging Players, Growth Analysis And Precise Outlook 2027 The Oxford Spokesman - The Oxford Spokesman

The Privacy Setting That’s Not on Your Radar: Your Internet Browser – Toolbox

As we celebrate Data Privacy Day, it is essential to realize that one of the most prominent aspects of end users daily lives is constantly exposed online, and most of the time, they do not even realize it. It is surprising to many users that it happens every day with the tools used to surf the internet the browser. James McQuiggan, Security Awareness Advocate at KnowBe4, shares our need to be cautious irrespective of what browser we use, be it Google Chrome, Microsoft Edge or Mozilla Firefox.

Every day, we use the browser to search for information, look up recipes, shop, watch videos or check email. However, like a refrigerator, or television, we do not need to understand how it works, just that it needs to work. Like our fridges or TVs, it is still essential to understand some of the devices capabilities and what not to do. You would not leave your fridge door open when trying to cool your house. It will damage the fridge. There are similar warnings and things you should not do with a browser.

When using an internet browser, it is crucial to maintain a heightened awareness that we leave a digital footprint behind, and clicks can have consequences. End-users should be wary of clickbait or marketing ads that want them to click on ads. These ads can also be hotbeds for cybercriminals, just waiting to trick their victim into clicking. They inject malicious code in the marketing ads that can access our systems. Not all sites or ads are malicious, but it is essential to be aware of clickbait because curiosity is one of those lures in human nature that social engineers and cybercriminals leverage to access our systems and data.

When end-users visit a website, they are unaware of the digital fingerprint they leave behind. It is a specific fingerprint relating to our operating system, browser type, and plugins used. All this information gets collected by the website someone visits and can be sold off to marketing agencies to see the demographics and variety of systems people are accessing.

This digital fingerprint also contains:

And all of this gets put together into this fingerprint or User-Agent. Various websites can provide this information for someone to be aware of the data being transmitted back and forth. A quick Google search for what is my browser and numerous sites can provide the information for the user to see what is given to websites when they visit them.

There are two recommendations to support and protect against these types of browser dangers:

Not only will this reduce the ad congestion on some web pages, but it will also cover the end-user when surfing on those styles of pages. There are many different ad blockers, but users should do some research to see which one will work best for their needs and interests. Some are free, some are subscription-based, and some are designed specifically for privacy experts. Their preference is the uBlocker browser plugin from discussions with various privacy experts.

See More: Why Security Does Not Equal Privacy

Some plugins and browsers can reduce someones digital fingerprint when visiting a website. Utilizing these plugins or browsers will not completely hide the information, but it does reduce the amount of information shared with websites that one visits. A quick Google search for digital fingerprint block browser will provide information about the various browsers and plugins that users can add to limit their online privacy. Sometimes users think that the privacy tab or incognito mode will protect them. In reality, all it does is prevent the browser from saving the websites in the browser history, and it does not store any of the website files into the systems cache.

With browsers, many people do not realize that it is one of the first things that cybercriminals or malicious hackers go after once they access the system. This is because many people like to save their passwords in their browsers. Their browser may pop up when they enter a username and password the first time and ask, Would you like me to save these credentials? It is a convenience, and unfortunately, that information is now saved in the browser. People may believe it is protected, and it is often not. Cybercriminals can utilize a tool to extract the data from the browser within seconds. The data collected allows them to view any saved user accounts and passwords, bookmarks, cache and anything else held in the browser.

See More: Microsoft Exchange Server Hack Shows Why Risk Assessment Is Key to Data Security

To reduce this attack risk, end-users should use a password manager to save passwords instead of the browser. Using a password vault will utilize a higher level of encryption and protection, allowing someone to save information about security questions and other relevant information regarding their accounts outside the browser. So, if a system is compromised and browser data is stolen, the cybercriminal can now steal the usernames and passwords. With a password-protected vault, they will not be able to gain access unless they use brute force and attack against it by trying all the permutations of letters, numbers and special characters. To prevent this from being successful, use a very strong password to secure it, and do not forget it. Using a password vault is certainly another way to enforce additional privacy of an end users data and protect their information from cybercriminals.

While data privacy day comes around only once a year, we must remember maintaining a certain level of privacy online year-round without exposing too much information. As we continue to surf the web, we must invest time and effort to protect ourselves and avoid getting entangled in it.

How are you boosting your privacy stance this data privacy day? Share with us on LinkedIn, Twitter, or Facebook. Wed be thrilled to know!

See the article here:
The Privacy Setting That's Not on Your Radar: Your Internet Browser - Toolbox