The Privacy Act inspires cyber criminals, beware of fraudulent news



[ad_1]

BRATISLAVA, July 18 (WebNovinysk) – The emails that organizations sent to users when the GDPR came into effect inspired cybercriminals. As reported in the quarterly report of ALEF, counterfeit emails allow attackers to obtain login information for different accounts

Jan Kopriva, head of the team at the same time. CSIRT's cyber security incident, adds that the best security measure is a well-trained user. " Because paradoxically, in some organizations, in most minor organizations, the greatest harm to consciousness is, in general, ," he explained.

ALEF confirmed Kaspersky Lab's recent findings that attackers are turning away from ransom and are focusing on cryptomimetic programs. " Although Ransomvér can report a high profit immediately, but that it is a one-time income with nearly half the security of the police announcement, Coinminer will not even notice the victim or discard it, but will make no report. Ransomvér, a program that encrypts the contents of the disc and asks to pay for ransom, is still prevalent and the attacker is bearing fruit . " In a survey of 1,800 global companies, up to 34% of them admitted to being willing to pay ransom instead of trying to save data or money. Invest in additional security "said Mr Kopřiva.

The main focus of the flight is Europe and Russia

Most, according to ALEF, are stealing connection data for social networks. These cases represent more than half of the cases, with Europe and Russia being the main target, and the stolen data is sold not only on the black web but also on the internet. For example, Facebook costs about $ 9 per item

The devices of the Internet of Things (IoT) are still not completely secure. An example is the Tapplock One lock, which can be opened by fingerprint or application. Since the launch, several vulnerabilities have emerged that have allowed the lock to open virtually to anyone. The Innsbruck cable car again had a control panel available on the internet. For example, a potential attacker could set the speed of the ropeway, the distance from each cabin or the tension of the rope. "Fortunately, no one has been abused," added ALEF.


Website © SITA All rights reserved.

[ad_2]
Source link