Jump to content

Search the Community

Showing results for tags 'Hackers'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • A Test Category
  • Immunet Information
    • Announcements
    • Support Documentation
    • FAQ
  • Immunet Community Discussions
    • Immunet General Forum
    • Ideas
    • Immunet Support (Issues/Defects)
    • False Positives
    • Malware Detections
    • Malware Removal
  • Immunet Local Communities
  • ClamAV For Windows Community
    • ClamAV For Windows General Forum

Categories

  • Knowledge Base
  • Installation
  • FAQs

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


MSN


Yahoo


Skype


Location


Interests

Found 4 results

  1. With the pandemic raging out of control 'many' people have opted to use the video conferencing Zoom app to stay in touch with relatives, friends & co-workers remotely. The Black Hats have taken notice of this since the apps' popularity has risen dramatically too. The most recent scam that I've heard of is to send you either an email or text message stating that your Zoom account has been deactivated/disabled and to click on the link provided to correct the issue with Zoom. Of course if you click on that link you're only going to get arbitrary code being executed and installed on your device instead. This malware will try to steal log-in information and/or other personal data & possibly install additional spyware/malware on your system. There was an instance not long ago where hackers gained access to a grade school using Zoom for remote learning and sent the children pornographic content instead! That's just "too low!" Here's an informative article by the Better Business Bureau that outlines how Zoom is also being used in a very recent phishing scam as well. https://www.bbb.org/article/news-releases/23421-bbb-scam-alert-that-zoom-invite-is-really-a-phishing-scam
  2. It's not recent news that hackers have been targeting our institutions of higher learning. In my home state of Pennsylvania, Penn State University was recently hacked as an example. If that wasn't bad enough read on. What I find "completely reprehensible & totally disgusting" is that a group calling themselves "The Dark Overlord" have now targeted elementary, middle & high schools! In one case they were able to hack into the video surveillance system of an elementary school to spy on the children. In some cases they have actually threatened to harm the children if a ransom was not paid. They have also attempted to steal personal data from the databases of these affected schools, such as names, birth-dates, addresses, social security numbers, etc... There are even some dark web hacker groups that have actually condemned this Dark Overlord group for overstepping their bounds for targeting children! After all even a hacker may be a family man or woman with kids. Internet-security experts are urging all school districts across the country to either invest more money in cyber-security measures or take pro-active steps to better secure their databases because of this. "These scum-bag cyber-criminals have sunk to a new low and I hope they are caught and prosecuted to the fullest extent of the law!!!"
  3. Do you use a Wi-Fi router? I would recommend you read this Reuters news service article. (Reuters) - Cyber security watchdogs and researchers are issuing warnings over risks associated with a widely used system for securing Wi-Fi communications after the discovery of a flaw that could allow hackers to read information thought to be encrypted, or infect websites with malware. An alert from the U.S. Department of Homeland Security Computer Emergency Response Team on Monday said the flaw could be used within range of Wi-Fi using the WPA2 protocol to hijack private communications. It recommended installing vendor updates on affected products, such as routers provided by Cisco Systems Inc or Juniper Networks Inc. Belgian researchers Mathy Vanhoef and Frank Piessens of Belgian university KU Leuven disclosed the bug in WPA2, which secures modern Wi-Fi systems used by vendors for wireless communications between mobile phones, laptops and other connected devices with Internet-connected routers or hot spots. "If your device supports Wi-Fi, it is most likely affected," they said on the www.krackattacks.com website, which they set up to provide technical information about the flaw and methods hackers might use to attack vulnerable devices. It was not immediately clear how difficult it would be for hackers to exploit the bug, or if the vulnerability has previously been used to launch any attacks. Finnish security firm F-Secure said experts have long been cautious about Wi-Fi's ability to withstand security challenges of the 21st century. "But the worst part of it is that it's an issue with Wi-Fi protocols, which means it affects practically every single person in the world that uses Wi-Fi networks," it said on its website. Microsoft Corp said it had released a security update for Windows. Customers who applied the update, or had automatic updates enabled, would already be protected, it said in a statement emailed to Reuters. CERT New Zealand and CERT India asked users to apply security updates. CERT NZ suggested using ethernet cables and to connect directly into the network, when possible. "Given the complexity of updating smart devices such as mobile phones, CERT NZ also strongly recommends disabling Wi-Fi when it isn't required," it said in its advisory. (http://bit.ly/2gfho2b) The Wi-Fi Alliance, an industry group that represents hundreds of Wi-Fi technology companies, said the issue "could be resolved through a straightforward software update". The group said in a statement it had advised members to release patches quickly and recommended that consumers quickly install those security updates. (Reporting by Jim Finkle in Toronto and Dustin Volz in Washington; Additional reporting by Aradhana Aravindan in Singapore; Editing by Susan Thomas, Dan Grebler and Jacqueline Wong)
  4. One of the three major U.S. credit reporting agencys, Equifax, has been hacked! Equifax admitted to the breach today but they knew about it "at the very least" back in July 29th. Why it took so long for Equifax to admit to the breach? Your guess is as good as mine. My opinion is they should have alerted consumers much sooner of the possibility that their personal information may have been compromised. I find that untenable considering the scope of the breach. Some questions need to be answered there. It is estimated that 143 million American's personal information may have been compromised! That's not a type o, "143 million people, that's almost half of the U.S. population!" This also includes some people in the U.K. & Canada. The data that may have been compromised includes names, addresses, dates of birth, social security numbers and even some driver's license information. Also an estimated 209,000 consumers may have had their credit card info stolen. "Yikes!" Equifax claims that data from businesses was not affected as far as their "current research" has determined. The FBI is investigating this breach. Equifax has also hired a private cyber-security firm to do their own investigation. Equifax is doing some "damage control" by offering free one year credit monitoring & identity theft protection for anyone whose information may have been stolen. Here is a link to Equifax if you wish to find out if you were affected and to enroll in the program if you were unfortunate enough to be one of the victims of this hack. There is a deadline to enroll, you have until November 21st to sign up for the service. https://www.equifaxsecurity2017.com/enroll/ Edit: There was a down side to singing up for Equifax's monitoring service. You had to agree to waive your arbitration rights which means you can not file or participate in a class-action law suit against the company but as of Friday they rescinded that requirement amid a backlash of protests. Regards, Ritchie...
×
×
  • Create New...