Category Archives: tips

How do you protect digital channels from cyber threats?

A well-thought out and managed social media presence is a must for most companies and their workforce, but too few of them think about the potential repercussions of an attack targeting it. Social media is increasingly seen as a battleground, providing the platform for complex influence campaigns mounted by nation-states (Iran, Russia), various hacker groups to get their message out and to advertise their services, and attackers looking to trick other users into parting with … More

The post How do you protect digital channels from cyber threats? appeared first on Help Net Security.

Manipulation tactics that you fall for in phishing attacks

It’s 6 p.m. on a Friday. Just as you finish packing up for the day, an email from your boss pops up on your phone asking why an urgent payment didn’t go out earlier in the week. He’s tied up in a business dinner, so he needs you to wire payment to a specific vendor immediately and send him a confirmation email here once you’ve done so. Eager to help (and get out of the … More

The post Manipulation tactics that you fall for in phishing attacks appeared first on Help Net Security.

Building security into DevOps versus bolting it on

In this podcast, Hari Srinivasan, Director of Product Management for Qualys, talks about building security into DevOps versus bolting it on, specifically for containers. Here’s a transcript of the podcast for your convenience. Hello! My name is Hari Srinivasan, Director of Product Management for Qualys, cloud and virtualization security. Welcome to this Help Net Security podcast. Today we’re going to talk about building security into DevOps versus bolting it on, specifically for containers. Containers are … More

The post Building security into DevOps versus bolting it on appeared first on Help Net Security.

Malicious hacking activity increasingly targeting critical infrastructure

In this podcast, Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, and Edward Amoroso, CEO of TAG Cyber, talk about how the traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT) and industrial control system (ICS) infrastructure have become much more prominent components of national critical infrastructure, that malicious hacking … More

The post Malicious hacking activity increasingly targeting critical infrastructure appeared first on Help Net Security.

5 ways to tell if you’re a victim of identity theft

Despite significant advances in security technologies and general awareness of cybercrime, the number of identity theft cases continues to grow. According to credit scoring specialist Experian, 179 million people had personal data stolen last year, and 32% of them went on to become victims of identity theft.

Unfortunately, confirming that you are a victim of identity theft is not always easy – or obvious. And the longer the thief goes undetected, the more money they can steal, creating other problems like damaging your credit score.

The problem is that it is not always easy to tell if someone is using your identity illegally. Here are some things you can check:

1. Unexpected transactions

You must check your bank and credit card transactions regularly, looking for anything unusual – especially payments that you don’t remember making. It’s not only the high value transactions that you need to watch either. Criminals will often make a tiny payment to check that the stolen card details work properly before making larger purchases – or emptying your bank account.

2. Unexpected bills and invoices

Your stolen identity can be used to set up credit accounts with retailers and lenders. Once billing begins, the paperwork will be posted or emailed to you, ready for payment. If you receive a bill you don’t recognise, you should follow-up with the retailer immediately. Just make sure the invoice is legitimate – not a phishing email – before clicking any links.

4. You receive emails and texts asking to reset your password

As they begin the process of stealing your identity, hackers will try and compromise all of your online accounts. If they can’t guess your passwords, they may try to reset them – which means you receive a number of password reset emails that you never asked for. If you use 2 Factor Authentication to login, you will also receive unexpected messages or push notifications on your phone.

5. You get a call from a debt collector

Most terrifying of all is a call from a debt collector about an unpaid bill for a purchase you never made. You should check your credit report immediately if you are contacted by a debt collector and alert them to any discrepancies. You will also need to file a police report as soon as possible.

Block the loopholes

Hackers and cybercriminals are becoming increasingly sophisticated with their identify theft attacks. Fraudsters will always target online stores and banks first, but your own devices are also at risk of hacking.
To better protect yourself, ensure that you use a “virtual vault” to protect sensitive personal information that could be used for identity fraud. These virtual vaults use antivirus software to block malware bots and are encrypted to keep the hackers out.

Download a free trial of Panda Dome today to test out our data shield – and to better protect yourself against identity thieves.

The post 5 ways to tell if you’re a victim of identity theft appeared first on Panda Security Mediacenter.

How to create a Hall of Fame caliber cybersecurity playbook

Whether the sport is football, basketball or hockey, all the best coaches have playbooks and reports with the latest information on opponents. They study the playing field and never go into a game unprepared, spending hours fine tuning strategies, whether that’s finding the perfect angle to swoop past defenders or knowing an offenses’ weakness and stopping them dead in their tracks. Cybersecurity should be no different. Sure, you’re not a quarterback looking for a lane … More

The post How to create a Hall of Fame caliber cybersecurity playbook appeared first on Help Net Security.

Data privacy automation: Unlock your most valuable asset

In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with operationalizing a data privacy solution for the company. That’s because data privacy is fundamentally a data issue, with privacy being an outcome of a comprehensive data protection strategy. In a world of exploding data, it’s impossible for privacy professionals using manual, survey-based approaches to stay on top of this ever-changing sea of information. Companies constantly … More

The post Data privacy automation: Unlock your most valuable asset appeared first on Help Net Security.

Cyber Security Tricks and Treats

When it comes to cybersecurity, there are very few treats to be enjoyed.

With internet usage at an all-time high, users are especially vulnerable to cyber attacks and hacks. These tricks can include phishing attacks, session hijacking and ransomware. And since it’s National Cyber Security Awareness Month, it’s the perfect time to brush up on cyber security knowledge, and find out how you can make a treat out of a trick this Halloween season.

This Halloween, keep your devices and personal information safe from hackers’ tricks. If something looks wrong or feels too good to be true, it probably is. Ensure all devices have the most current updates, install an antivirus and use a VPN when necessary.

Get started today.

Download Panda Free Antivirus, and defeat the evil gremlins who could turn your Halloween into a nightmare.

The post Cyber Security Tricks and Treats appeared first on Panda Security Mediacenter.