CONTENT MARKETING SPECIALIST

Before rushing into the latest cyber security news, we have an important announcement to make. This week we launched a huge project, one that we’ve been working on for months. We already published a blog post about it but, in case you missed it, here it is again: we’re proud to present to you The Ultimate Windows 10 Security Guide.

Windows 10 was launched last summer and raised lots of debates concerning its security and privacy. In the same time, it was boldly described as “the most secure Windows ever”.

We examined all its security and privacy elements, to understand how they work, how they’re connected, and explained them all to you in this guide.

It’s a guide filled with practical advice, but also screenshots, step-by-step instructions and extra resources for each and every feature.

And if you think this guide is useful or relevant to your friends, family, colleagues or the ones following you on social networks, please feel free to share it. And you can also download a free PDF version of it.

This week we also updated two security guides that will help you protect your data and improve your security:

  • 9 free encryption software tools
  • 10 easy steps to improve your Twitter security and privacy

  • And now off to the cyber security articles of the past week.



    Security articles of the week


    1. TorrentLocker Campaign Exploits Spanish Utility Brand

    Remember our last week’s security alert on how other countries will be targeted with TorrentLocker? Well, here it goes.


    2. Nearly all phishing emails now contain ransomware

    As of the end of March, 93% of all phishing emails contained ransomware.


    3. The emergence of historical mega breaches

    In the past month, hundreds of millions of user accounts from popular networks like LinkedIn, MySpace, Badoo and Tumblr have been found for sale in the digital underground.

    Troy Hunt talks about all these historical mega breaches:

    “But here’s what keeps me really curious: if this indeed is a trend, where does it end? What more is in store that we haven’t already seen?”


    4. How scammers are exploiting the recent data breaches

    Of course scammers are taking advantage of all the recent mega data breaches. They’re asking for ransom from people in exchange not to leak their data.


    5. What to learn from Katy Perry’s Twitter account breach

    What Katy Perry‘s Twitter account breach teaches us about computer security (hint: start with strong, unique passwords and activate two-factor authentication).


    6. List of data breaches and cyber attacks – May 2016

    Lewis Morgan from IT Governance put together a list of data breaches and cyber attacks that took place in the last month.

    And yes, that’s quite a huge list.


    7. Infographic – company vulnerability: 5 ways to keep your data secure from cyber attacks

    An infographic with 5 tips to help you keep your company’s data secure from cyberattacks.


    8. Arrests made in $45 million Russian bank attack

    Russian law enforcement arrested 50 cyber criminals in connection to 5-year bank heist.


    9. The Romanian teen hacker who hunts bugs to resist the dark side

    Long read for this weekend: how Alex Coltuneac, a 19 year-old boy from Cluj, Romania, spends his free time hunting bugs.

    So far, he received bug bounty payments from Google, Facebook, Microsoft, Adobe, Yahoo, eBay and PayPal for all the flaws he reported.


    10. Kevin Mitnick’s story

    From being hunted by the FBI to working alongside them – Kevin Mitnick‘s story.


    Conclusion


    Most likely, we’ll keep seeing major data breaches like the ones from the past month. Here are three small things that you can do to keep your accounts safe:

    1. Use a separate email address to register your social media accounts. Keep it unconnected to any other accounts (personal, work, shopping).

    2. Use a strong and unique password for each account. It’s important not to recycle passwords. Otherwise, if any of those accounts ends up breached, the cyber crooks will have access to the other profiles where you set the same password.

    3. Activate the two-factor authentication wherever that’s available. It works as an extra shield, asking for a second way to authenticate yourself every time you’ll want to log in from a new device (PC / mobile). The second factor is usually a unique, time-sensitive code, that you receive on your mobile phone.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    GO TO TOP