google-site-verification: google30a059f9a075f398.html

Day: February 1, 2018

Top 10 Tips to Protect you from Identity Theft

Top 10 Tips for Identity Theft Protection Identity thieves use your personal information without your knowledge. The thief may use your name to recover debt and even commit crimes. The following tips can help you reduce the risk of becoming a victim. Protect your social security number from identity theft. Do not carry your social

Cryptocurrency Mining Smominru Botnet Infected more than 500,000 Windows Machines

CyberWisdom Safe Harbor Commentary on Smominru: A must-read story from gbhackers.com dissects that security researchers from Proofpoint discovered Monero miners using the notorious EternalBlue Exploit. Attackers using persistent botnets refer to Smominru as spreading the infection through all possible vulnerabilities. The 2017 Cryptocurrency Exchange, which targets Ransomware, data breaches, and hacking, is known. WannaCry Ransomware

How to remove pesky adware from your PC

CyberWisdom Safe Harbor Commentary on removing adware from your PC: What is most likely to be an overlooked story from blog.malwarebytes.com How to delete adware from your PC Your way out is relatively simple. If you think there’s an adware issue on your PC, you can manually delete it in a few easy steps. Back up

Samsung confirms it is making ASIC chips for cryptocurrency mining

CyberWisdom Safe Harbor Commentary on Samsung: techcrunch.com announces a hidden news that Samsung has confirmed that it has started production of ASIC chips for digging Bitcoin, ether and other cryptocurrencies. “Samsung’s foundry business is currently engaged in the manufacture of cryptocurrency mining chips, however, we can not disclose more details about our customers,” a company spokesman

Scarab ransomware: new variant changes tactics

CyberWisdom Safe Harbor Commentary on  Scarabey: This story from blog.malwarebytes.com gives a surprising look at Scarab ransomware discovered in June 2017. Since then, several varieties have been created and discovered in the wild. The most popular or widely distributed version is distributed through the Necurs botnet, originally written in Visual C. However, after unpacking, we

Cyber Blackmail Expanding Beyond Ransomware to IoT and Social Media

CyberWisdom Safe Harbor Commentary on Cyber Blackmail Today I came across this story from darkreading.com that covers digital extortion which really cybercriminal cyber blackmail. When we think of cyber blackmail, we often think of ransomware. But now cybercriminals are looking for new ways to shatter organizations beyond blackmail. Cybercriminals already know that many businesses will pay if

Google Deletes 700,000 Malicious Apps From Play Store in 2017

CyberWisdom Safe Harbor Commentary on Google: A recent story from gbhackers.com discusses things we don’t talk about but Google deleted about 700,000 malicious applications in 2017, that is in violation of Google Play Store policies and malicious adware applications that silently execute malicious activity on users’ Android devices. The removal of applications was 70% more than