More stories

  • in

    Ransomware: This is how half of attacks begin, and this is how you can stop them

    Image: Getty Over half of ransomware attacks now begin with criminals exploiting vulnerabilities in remote and internet-facing systems as hackers look to take advantage of unpatched cybersecurity issues.  According to analysis of ransomware incidents during the past year by researchers at security company Secureworks, 52% of attacks started with malicious hackers exploiting remote services.  Vulnerabilities in […] More

  • in

    Microsoft warns of password attacks against Exchange Online, here's what you need to do

    Image: Getty Microsoft’s Exchange team is warning Exchange Online users that many of its customers are being targeted by password spray attacks using its basic authentication.  The warning comes as Microsoft begins turning off Basic Authentication, or “Basic Auth”, in Exchange Online tenants worldwide from October 1, 2022. Microsoft’s explains here why it is deprecating […] More

  • in

    Victims of these online crooks lacked a key security feature. Don't make the same mistake

    Image: Getty/LaylaBird There has been a big rise in business email compromise (BEC) attacks – and most victims work at organisations that weren’t using multi-factor authentication (MFA) to secure their accounts. BEC attacks are one of the most lucrative forms of cyber crime: according to the FBI, the combined total lost is over $43 billion and […] More

  • in

    Microsoft: New Exchange Server zero-days already used in attacks, expect more to come

    Close up of hands typing on a keyboard Getty Images/iStockphoto Microsoft has warned that attackers are already taking advantage of recently disclosed zero-day exploits to hack into victim’s networks and steal data – and more attacks are likely to be on the way. The two new zero-day vulnerabilities in Microsoft Exchange Server – CVE-2022-41040 and […] More

  • in

    The best home security systems of 2022

    If you are most concerned about protecting or being able to monitor outdoor spaces, such as your garden, porch, an outside office, or garage doors, the Arlo Pro 4 spotlight camera security bundle is a great option for you. The Arlo Pro 4 spotlight camera security bundle, available at Best Buy, comes with three Pro 4 cameras that can be mounted outdoors or placed indoors, perhaps on your window sill, for example. Each camera offers a 160-degree field of view and records footage in 2K HDR video. You can tap into the cameras, day or night, to zoom in on details, and the inclusion of color night vision makes Arlo’s cameras an excellent option for vulnerable outside spaces. Furthermore, the typical hassle of installing security solutions outside has been wiped out as each weather-resistant camera is wireless and powered by rechargeable batteries — and each comes with an anti-theft mount. The pack also includes batteries, a charging station, screw kits, a security key, and a sign to politely warn would-be intruders that your area is being monitored.  More

  • in

    New Exchange Server zero-day vulnerabilities are being used in cyberattacks: Protect your network now

    Image: Getty Newly discovered zero-days in Microsoft Exchange Server are being used actively in cyberattacks. The two zero-day vulnerabilities affect Microsoft Exchange Server 2013, 2016, and 2019, Microsoft Security Response Center (MSRC) has warned, after the exploits were disclosed by researchers at Vietnamese cybersecurity firm GTSC. One (CVE-2022-41040) is a is a Server-Side Request Forgery […] More

  • in

    Microsoft: Hackers are using open source software and fake jobs in phishing attacks

    Image: Natee Meepian / Shutterstock Microsoft is warning that hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers that in reality lead to malware attacks. A phishing-happy hacking crew linked to North Korea’s armed forces has been using trojanized open-source apps […] More