Weekly Security Roundup #83: More Breaches, Ransomware Attacks and Malware Strains
New cyber attacks call for new (or improved) protection measures
In case you were starting to miss them, this past week brought even more data breaches, ransomware attacks and new malware strains. Fun days indeed.
Given the context, our latest article on how we can protect our PCs with multiple layers of security comes right on time.
We always talk about how we should think about our security system like an onion and that we should build it layer by layer. In case one layer goes down, others remain in place.
However, we never put together all the layers that you can build. This article does exactly that – it’s a visual guide to how you can build your own security system, step by step.
Now time for the news roundup:
Security articles of the week
In case you visited Acer’s online shop in the past year, tough luck. Your credentials might have also been compromised.
The company explained that the breach involves information about customers who used its North American ecommerce site between May 12, 2015 and April 28, 2016.
And same thing happened to the online back-up company Carbonite.
A new form of Android malware is using Google Talk to call mysterious Chinese phone numbers.
Please enable this feature everywhere it’s available. It will make your cyber accounts more secure.
And that’s all just because of the mega botnet that was taken down at the beginning of this month.
“Do not rejoice, I believe that this transitionary moment in which the principal criminal rings are searching for new structures.”
And the same thing happened last month to the South Korea central bank.
A mobile advertising company that was tracking the locations of hundreds of millions of consumers without their consent was fined $950,000.
One of the most interesting reports we read lately, it follows the evolution of ransomware in the past two years.
Be paranoid. Put tape on your webcam. Better be safe than sorry, right?
Stop postponing and start working on your cyber security layers. Never let the attackers reach your most valuable data.