google-site-verification: google30a059f9a075f398.html

Day: January 12, 2018

7 parental controls you can use right now on your kid’s iPhone

CyberWisdom Safe Harbor Commentary: A must-read story from opens up to seven controls parents can use right now to protect their kids’ privacy and restrict their access to explicit content. Apple labels the iPhone’s parental controls as Restrictions. To enable them, go to Settings > General > Restrictions > Enable Restrictions and enter a four-digit passcode that will

Rise of Malware Abuses Legitimate Services for Communications

CyberWisdom Safe Harbor Commentary Malware typically includes the ability to communicate with an attacker-controlled Internet system in an attacked network. This gives the attacker several important capabilities.  Steve Miller, an incident response professional and a threat intelligence analyst from Anomali identified some malware families observed using legitimate services and did some detailed research on malware using

Rogue North Korean Hackers is likely underwriting cyberattacks by mining Monero

CyberWisdom Safe Harbor Commentary: This story from focuses on the rises of cryptocurrencies like bitcoin raises a lot of speculation about why and where they are used. However, there are countless altcoins, such as  Monero, in existence – digital tokens use blockchain technology, but can be consumed and mined in different ways. AlienVault recently

Apps Exposing Children to Porn Ads Booted From Google Play

CyberWisdom Safe Harbor Commentary: This story from dissects a little known fact that last December, 60 apps were removed from the Google Play market, a program infected by a virus known as AdultSwine’s malware, which in some cases generates pornographic ads on children’s apps. Developers behind malicious applications also use panic techniques to trick

FakeBank malware accesses sensitive SMS banking messages

CyberWisdom Safe Harbor Commentary: This story from reveals mobile malware programs, primarily aimed at Russian bank customers, could take over victims’ SMS capabilities by allowing cybercriminals to intercept SMS messages that contain bank security passwords and then use those passwords to reset bank account passwords. Trend Micro further reported that once implemented on a

Transformed RIG EK turn covertly delivers cryptocurrency miners and

CyberWisdom Safe Harbor Commentaries: This story from educates things we don’t talk about but RIG exploit transform where the money is – from cyber attack exploits to cryptocurrencies in funding the criminal ecosystem As cryptocurrencies become more and more popular, we can only expect to see the increase in malicious coin miners, due to increased financial