Cybersecurity company finds classified NSA, Army data online

“A cybersecurity company said Tuesday it found top secret files related to classified Army communications systems sitting unprotected online for anyone to see.

The data belonged to the U.S. Army’s Intelligence and Security Command, a division of both the Army and the National Security Agency. It’s the latest known setback linked to the NSA where former agency contractor Edward Snowden disclosed a cache of classified material in 2013.”

Read more details here.

Author: Deb Riechmann

FedEx Grapples With TNT Express Cyberattack: Time to Dump?

“FedEx’s operations have been severely hurt by the Jun 27 cyberattack on its subsidiary, TNT Express. The attack caused large-scale service delays on its TNT Express unit. Evidently, the company’s top line in first-quarter fiscal 2018 was affected, primarily due to decreased volumes at TNT Express. First-quarter results were also hampered by Hurricane Harvey. In fact, the company incurred costs of approximately $300 million during the quarter due to the catastrophe.”

Read more details here.

Author: Zacks Equity Research

Guarding the firewall: Ensuring cyber security for small businesses

Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information.

Small and medium businesses (SMBs) , unfortunately, have been seeing rising incidences of cybercrime. Growing digitization of business assets and access to sensitive customer information, while driving rapid improvements in business, are also making them more vulnerable. Shops, clinics, community centers, and small manufacturers have all been attacked in the recent past. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees. Reports also say that half of the attacked small businesses close down within six months as a result of the loss of customer loyalty and reputation.

For a list of must-have cyber security measures for SMBs, click here.

Contact your local Cyber Gate IT vCIO to learn more about how we can help you safeguard your business.

Author: Nikhil Arora

U.S. Government issues alerts about malware and IP addresses linked to North Korean cyber attacks

US-CERT, the Department of Homeland Security team responsible for analyzing cybersecurity threats, has posted a warning about cyber attacks by the North Korean government, which it collectively refers to as “Hidden Cobra.” The technical alert from the FBI and Department of Homeland Security says a remote administration tool (RAT) called FALLCHILL has been deployed by Hidden Cobra since 2016 to target the aerospace, telecommunications and finance industries.

FALLCHILL allows Hidden Cobra to issue commands to a victim’s server by dual proxies, which means it can potentially perform actions like retrieving information about all installed disks, accessing files, modifying file or directory timestamps and deleting evidence that it’s been on the infected server.

The FBI and Department of Homeland Security also posted a list of IP addresses linked to Hidden Cobra. The FBI says it “has high confidence” that those IP addresses are linked to attacks that infect computer systems with Volgmer, a Trojan malware variant used by Hidden Cobra to target the government, financial, auto and media industries.

For more details, read here.

Author: Catherine Shu

Hackers ‘take over Boeing 757’ as it’s sitting on the runway, without the pilots realizing

Security researchers have shown off alarming hacks where they ‘take over’ cars – but a new demonstration may be the scariest yet.

Security researchers from America’s Homeland Security were able to remotely ‘hack’ a Boeing 757 while it sat on the runway, without the pilots being aware.

For more details, read here.

Author: Rob Waugh

SMEs and Cyber Attacks: What you need to know

According to Technopedia, “A cyber attack is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cyber crimes, such as information and identity theft.”

Why are some SMEs Targets for Cyber Attacks?

Poor security and a lack of awareness training can leave SMEs ill-prepared for attacks, making them easy targets for cyber criminals.

The threat of cyber attacks is ever-present and isn’t going away. Methods are becoming more sophisticated and ever-increasing connectivity means there are more opportunities for cyber criminals than ever. The risks to businesses are severe: a cyber attack can impact your bottom line, your reputation and even your ability to continue operating.

Check out the link below to find out why small and medium businesses should be concerned and how an attack could happen.

For more details, read here.

60 Percent of Companies Fail in 6 Months Because of This

Small business is all about managing risk since no risk can be prevented with 100% certainty. But what if I told you that there is one risk which puts 60% of businesses that encounter it out of business? You’d get better odds at Vegas playing craps! Furthermore, what if I told you that it is virtually certain you will encounter some form of this risk and that you might already have and not even know about it? Worse yet, I’ll bet most people reading this are barely, if at all, prepared for it.

It’s the risk of a cyber attack.

Research conducted by the National Cyber Security Alliance found that:

Almost 50 percent of small businesses have experienced a cyber attack.
More than 70 percent of attacks target small businesses.
As much as 60 percent of hacked small and medium-sized businesses go out of business after six months.

For more details, read here.

Author: Thomas Koulopoulos

How can you protect yourself from cyber attacks?

There are several ways to protect yourself from cyber attacks. Williams advised against clicking on links sent in emails or text messages from unfamiliar email addresses.

“Viruses can be embedded in (Microsoft) Word or Excel documents,” said Williams. “You have to be very, very careful about what you open. If it looks strange, don’t open it. Just being careful is the best thing you can do.”

Updating passwords, computers, mobile applications and anti-virus software are critical to cyber safety.

For more details, read here.

Author: Jeff Malachowski

Need for cyber security professionals rises with prevalence of attacks

The likelihood of falling victim to a cyber attack grows by the day as hackers become more prevalent and sophisticated.

More than 3 million data records were lost or stolen every day in the first half of 2016, according to CyberArk. The Federal Bureau of Investigation (FBI) reported more than 4,000 ransomware attacks – a method where hackers threaten to publish a victim’s data unless a ransom is paid – occur each day, a 300 percent increase from 2015. One in every 131 emails contained malware – short for malicious software – in 2016, the highest rate in five years.

“Cyber security is a never-ending, ever-changing activity,” said Ed Rojas, a national cyber security consultant. “Every hour a new malware is identified or a new attack in progress is discovered. As technology evolves to make our lives easier, so does what is known as attack vectors. …Everyone can be a victim at any time.”

For more details, read here.

Author: Jeff Malachowski