Ransomware spreading gangs are targeting only at Nights n weekends

Cybersecurity Insiders

Those spreading ransomware are seen targeting companies and individuals only at nights and weekends says a study taken up by FireEye. The Cybersecurity firm confirms that 76% of ransomware infections take place at night time in the enterprise sector and 49% of them take place during the weekends.

FireEye researchers claim that the hackers are targeting companies only in odd hours is because most firms do not employ IT, staff, at night time or even if they do they do it in a thin line.

Full article

Cyber Attack risk on IoT devices is too high says report

Cybersecurity Insiders

A recent study conducted by Unit 42, a threat intelligence platform of Palo Alto Networks has confirmed that the risk of a cyberattack on the Internet of Things (IoT) is too high than ever. And the study confirmed that all the 1.2 million IoT devices installed at more than 10,000 locations across enterprise IT and healthcare are vulnerable to cyber threats.

Gartner in its recent study estimated that by the end of the year 2019, 4.8 billion IoT endpoints were expected to be in use, across the world- an increase by 21.5% from the year 2018.

Unit 42 IoT Threat Report states that the devices which are working are super susceptible to cyber attacks as most of the device security posture is not meeting the standards leaving companies using them vulnerable to IoT targeted malware such as spyware.

Full article

New law 1 April 2020 – Swedish Covert Surveillance of Data Act

Mullvad

New law in Sweden 1 April 2020

Covert Surveillance of Data Act (SFS 2020:62) (the act is short-term legislation and will enter into force on 1 April 2020)

Short Summary:

Since Mullvad VPN is not to be regarded as an electronic communications service with a reporting obligation according to LEK, Chapter 2, Section 1, Mullvad VPN cannot be subject to a duty to cooperate in connection with the enforcement of a decision authorising covert surveillance of data in accordance with the new Covert Surveillance of Data Act.

For users (of computers and other electronic devices), the new Covert Surveillance of Data Act grants law enforcement agencies the authority, upon a special permit (in each specific case) from a competent Swedish court, to secretly install software or hardware on suspect users’ devices or devices which the suspect in special cases have or will most likely contact. This implies that law enforcement agencies may access a suspect user’s information before it is encrypted by VPN-services such as Mullvad VPN.

To read the full text:
Swedish: https://mullvad.net/help/lagen-om-hemlig-dataavlasning/
English: https://mullvad.net/help/swedish-covert-surveillance-data-act/

How to keep your mobile secure from Malware

Cybersecurity Insiders

A recent study carried out by Avast Threat Labs has discovered that 72% of Android devices operating across the world are prone to adware and this witnessed a drastic increase over last year as the infection percentage was recorded to be 34% than 13% the previous year.

Researchers from Avast have confirmed that mobile adware uses the CPU performance in a device in order to spam it with unwanted ads which not only drains the battery but also attracts all sorts of troubles like Ransomware, crypto mining and such.

It was found in the study made by Avast that the most common method used by hackers to infect a device with Adware was through a malicious app. Typically, the threat actors are seen disguising the apps in the form of gaming or entertainment apps which eventually land upon the device disrupting all its operational resources and turning them into zombies.

Full article

Online payment security: 8 Steps to ensure safe transactions

Cybersecurity Insiders

Online shopping has become an increasingly popular trend in the past few years as people find it more convenient to buy from the comfort of their homes. You can get pretty much anything and everything from online stores: groceries, clothing, jewelry, electronics and other household items. Yet, we need to consider for a moment if all these online financial transactions taking place are safe – and how can we ensure our protection from online frauds such as identity theft and phishing attacks.

Full article

Whatever – Lightweight Evernote App for Linux

FOSS Linux

Organising and managing day-to-day tasks or assignments has never been easy. Currently, there are several applications available in the market to help you organize your tasks. They come along with various features like note-taking, listing, sketching, etc.

One such application is Evernote. It is a cross-platform application used to manage tasks through note-taking, drawing, saving web content, sketching, and much more.

Unfortunately, this fantastic tool runs only on Android, IOS, macOS, and Windows. There is no Evernote app for Linux. There is a web version of Evernote which you can access using your browser of choice, but having a dedicated desktop app have their advantages, and you get the best experience.

Full article

Security News This Week: Elite Hackers Are Using Coronavirus Emails to Set Traps

WIRED

Photograph: BJ Formento/Getty Images

In a week dominated by news of the global Covid-19 pandemic, companies scrambled to find ways of securely supporting employees working from home. But the challenges are extensive, and in sectors like critical infrastructure and government defense, there’s often no safe way for workers to be remote.

Meanwhile, President Donald Trump suggested (not for the first time!) on Tuesday that a wall at the southern border with Mexico would help stop the spread of the novel coronavirus into the US. This is not true for a number of reasons. And Washington state made a good case for vote-by-mail infrastructure when its Democratic primary went smoothly on Tuesday in spite of the region’s major Covid-19 outbreak. The majority of voters send in their ballots rather than appearing at a polling place in person.

In other news, there were some small mercies in the security world this week as the certificate authority Let’s Encrypt engineered a massive course-correction after discovering a bug that could have broken millions of websites across the web. And researchers found that a staggering 83 percent of medical imaging devices run on operating systems that are too old to receive security patches from their developers—exposing the machines and healthcare networks more broadly to potential attack.

But wait, there’s more! Every Saturday we round up the security and privacy stories that we didn’t break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.

Full article

Welcome

We are so sorry for the inconvenience but during the last few days we had an issue with the WordPress installation we made about two weeks ago.

Not due to security reasons but to scalability we had to make it all over again.

Stay tuned for blog posts and pages to help you keep your privacy and integrity while being online.