- June 29th, 2015
- No Comments
PC security, Uncategorized
A hack caused planes to be grounded at Warsaw’s Chopin Airport for 5 hours.
There was no shortage of major security stories last week, ranging from the Samsung vulnerability that affects some 600 million users to continuing coverage of the leak at the US Government’s Office of Personnel Management. That leak, by the way, now seems to have affected as many as 18 million people, including former, current and prospective federal government.
Hackers look for vulnerabilities that they can exploit.
If you look for the term zero-day attack in your home dictionary, you probably won’t find it.
Go ahead and check…I’ll wait.
You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).
Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Forbes, Time, and USA Today. So what’s the deal? If the term is so important, why isn’t in the dictionary yet?
As with so many computer-related terms, the phrase zero-day attack has recently crept into the lexicon of the common person, after being used by technical types for more than a decade. Also known as 0day attacks, zero-hour attacks and 0hour attacks, these are attacks that exploit a vulnerability in a computer application or program.
A vulnerability, by the way, is simply an error in a software that could be exploited. It isn’t a problem in itself, and it isn’t something that stops an application or program from working properly. However, if a vulnerability is discovered by a hacker, and if the hacker uses the vulnerability to conduct nefarious activities, then the moment these nefarious activities are discovered, it is known as a zero-day attack.
Target, The Home Depot, and Kmart are just a few companies that were hit by a recent credit card breach. And the undeniable truth is it’s only a matter of time before another company makes headline news.
With the holiday season just around the corner, finding the perfect gift is on the minds of many consumers. In spite of the massive credit card breaches that have happened this year, a recent study by Deloitte found that while 42 percent of consumers are concerned about their personal data when making in-store purchases, 56 percent will still shop at retailers that have experienced a data breach. What this implies is that many consumers have accepted credit card breaches to be the norm.
Continue Reading… Credit Card Breaches Happen: What You Can Do to Protect Yourself
Unfamiliar messages. Passwords that no longer work. These are just two of the many clues that cybercriminals have gotten a hold of your password and broken into your account.
With the password compromised, the first step is to regain control over the account by changing passwords and checking configuration settings to make sure nothing has changed. However, if the root problem (how the passwords were successfully stolen) is not fixed, then the accounts will just get compromised again and again. That’s why it’s important to take your passwords seriously and to make sure they are strong.
Continue Reading… Why You Should Take Your Passwords Seriously