hack

Nine Ways To Avoid Getting Hooked By W-2 Phishing Schemes

Scammers pose via email as a senior company executive and request HR and Finance managers provide them copies of employee tax forms. Once a complete set is obtained, they sell it on the black market. Between $4 to $20 per form can be raked in by selling off the individual pieces of employee identity W-2s contain or using them to file tax returns and taking the refunds. It’s trapped a surprising number of small business managers and the problem’s only escalating.

Computer Security Experts Fear Second Wave Of ‘Biggest Ransomware Attack Ever’

The malicious “ransomware” attacks that seized computers worldwide Friday and held those systems hostage are likely to worsen this week as millions of people return to work – forcing them to discover the hard way whether they have been affected, security analysts said. With much of the world still reeling from the digital breach that prevented people from receiving hospital care, a second wave of what European officials have called “the biggest ransomware attack ever” could be devastating.

Dahua Devices Dangerously Exposed To Cybersecurity Hack

Dahua, the world’s second-largest maker of “Internet of Things” devices like security cameras and digital video recorders (DVRs), has shipped a software update that closes a gaping security hole in a wide range of its IP-cameras and DVRs. The vulnerability allows anyone to bypass the login process for these devices and gain remote (and direct) control over vulnerable systems. Adding urgency to the situation, there is now code available online that allows anyone to exploit this bug and commandeer a large number of IoT devices.

How To Protect Your ID Card Access Control System From Getting Hacked

When a 125kHz proximity card is powered up by getting in “proximity” of a reader, it immediately begins to transmit a fixed binary code number. As a result, it’s also possible to use a device that will stealthily power up the card from a distance to read and record its internal data. An attacker can then easily use the card’s information to let unauthorized people in.