FreshRSS

🔒
☐ ☆ ✇ McAfee Blogs

White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe

By McAfee — March 31st 2022 at 17:05

The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has imposed on Russia for the Ukraine invasion, stating, “There is now evolving intelligence that Russia may be exploring options for potential cyberattacks.”  

Along with this statement, the White House published a fact sheet outlining the new and ongoing steps the government is taking to protect its infrastructure and technologies, along with steps that private businesses can take to protect themselves from attacks as well.  

Of course, any successful attack on government operations and the operations of private businesses could potentially affect households as well—such as in the case of data breaches where data or information is stolen from a system, often the personal data and information of individuals. 

Word of potential attacks understandably leaves people feeling uncertain and may further leave them wondering if there’s anything they can do to protect themselves. With regards to data breaches and the cases of identity theft that typically follow, there are several steps people can take to keep safer online.  

Let’s break down what a data breach looks like, how it can affect you, and what you can do in advance of a breach to protect yourself. 

Examples of data breaches in the past 

We’ve certainly seen data breaches make the news over the years, which are often (but not always) associated with malicious hackers or hacker organizations. A quick list of some of the largest and most impactful breaches we’ve seen in recent years: 

  • Facebook – 2019: Two datasets leaked the records of more than 530 million users, including phone numbers, account names, Facebook IDs, and more. 
  • Marriott International (Starwood) – 2018. Leakage of 500,000 guest names, emails, actual mailing addresses, phone numbers, passport numbers, Starwood Preferred Guest account information, date of birth, and information about stays. 
  • Equifax – 2017. Approximately 147 million records, including name, address, date of birth, driver’s license numbers, and Social Security Numbers were leaked, as well as credit card information for a further 200,000 victims. 

Healthcare facilities have seen their data breached, along with the operations of popular restaurants. Small businesses find themselves in the crosshairs as well, with one report stating that 43% of data leaks target small businesses. Those may come by way of an attack on where those businesses store their records, a disgruntled employee, or by way of a compromised point-of-sale terminal in their store, office, or location. 

What differs with the White House warning is who may end up being behind these potential attacks—a nation-state rather than what are financially motivated hackers or hacking groups. (Some research indicates that nearly 90% of breaches are about the money.) However, the result is the same. Your personal information winds up loose in the world and possibly in the hands of a bad actor.   

What can get exposed in a data breach?  

The fact is that plenty of our information is out there on the internet, simply because we go about so much of our day online, whether that involves shopping, banking, getting results from our doctors, or simply hopping online to play a game once in a while.  

Naturally, that means the data in any given breach will vary from service to service and platform to platform involved. Certainly, a gaming service will certainly have different information about you than your insurance company. Yet broadly speaking, there’s a broad range of information about you stored in various places, which could include:  

  • Username and password 
  • E-mail address 
  • Phone numbers and home address 
  • Contact information of friends and family 
  • Date of birth 
  • Driver’s license number 
  • Credit card and debit card numbers, bank account details 
  • Purchase history and account behavior history 
  • Patient information (in the case of healthcare breaches) 
  • Social Security Number or Tax ID Number 

As to what gets exposed and when you might find out about it, that can vary greatly as well. One industry research report found that 60% of breaches were discovered in just days from the initial attack while others could take months or even longer detect. Needless to say, the timeline can get rather stretched before word reaches you, which is a good reason to change your passwords regularly should any of them get swept up in a breach. (An outdated password does a hacker no good—more on that in a bit.) 

What do cybercriminals do with this kind of information? 

The answer is plenty. In all, personal information like that listed above has a dollar value to it. In a way, your data and information are a kind of currency because they’re tied to everything from your bank accounts, investments, insurance payments—even tax returns and personal identification like driver’s licenses.  

With this information in hand, a crook can commit several types of identity crimes—ranging from fraud to theft. In the case of fraud, that could include running up a bill on one of your credits cards or draining one of your bank accounts. In the case of theft, that could see crooks impersonate you so they can open new accounts or services in your name. Beyond that, they may attempt to claim your tax refund or potentially get an ID issued in your name as well. 

Another possibility is that a hacker will simply sell that information on the dark marketplace, perhaps in large clumps or as individual pieces of information that go for a few dollars each. However it gets sold, these dark-market practices allow other fraudsters and thieves to take advantage of your identity for financial or another gain.  

Protecting yourself from the effects of data breaches 

The succinct answer is to sign up for an identity protection service. It can monitor dozens of types of personal information and then alert you if any of them are possibly being misused, so you can address any issues right away before they become a potentially much bigger problem.  

Further, pairing identity protection with online protection software can protect you even more. With an all-up view of your overall online security—how well you’re protecting yourself and your identity online—it can guide you through steps that can shore up your protection and make you safer still. 

Identity protection such as ours gives you the added benefit of a professional recovery specialist who can assist with restoring your affairs in the wake of fraud or theft, plus up to $1 million in insurance coverage. 

What if I think I’m the victim of identity theft? 

When a business, service, or organization falls victim to a breach, it doesn’t always mean that you’re automatically a victim too. Your information may not have been caught up in it. However, it’s best to act as if it was. With that, we strongly suggest you take these immediate steps. 

Change your passwords and use two-factor authentication 

Given the possibility that your password may be in the hands of a bad actor, change it right away. Strong, unique passwords offer one of your best defenses against hackers. Update them regularly as well. As mentioned above, this can protect you in the event a breach occurs and you don’t find out about it until well after it’s happened. You can spare yourself the upkeep that involves a password manager that can keep on top of it all for you. If your account offers two-factor authentication as part of the login process, make use of it as it adds another layer of security that makes hacking tougher.  

Keep an eye on your accounts 

If you spot unusual or unfamiliar charges or transactions in your account, bank, or debit card statements, follow up immediately. That could indicate improper use. In general, banks, credit card companies, and many businesses have countermeasures to deal with fraud, along with customer support teams that can help you file a claim if needed. 

Sign up for an identity theft protection service 

As outlined above, identity protection like ours can monitor a broad set of your personal information and provide you guidance for making it more secure, in addition to getting help from a professional recovery specialist.  

For an even closer look at identity theft, we have two articles that can help guide the way if you think you’re a victim, each featuring a series of straightforward steps you can take to set matters right: 

Proactively protecting yourself and your family 

No matter how uncertain news of possible cyberattacks may any of us feel, you can take steps to set some of that uncertainty aside. An identity protection service is a strong first move against possible identity theft, as is pairing it with online protection software that keeps you safer online overall. Likewise, knowing the signs of possible identity theft and what you can do to address it right away offer further assurance still—like having the services of a professional recovery specialist to help.  

In all, there’s no need to leave yourself wondering at the news from the White House. As an individual, you have it in your power to make yourself and your family safer than they are now. 

The post White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

DuckDuckGo Isn’t as Private as You Think

By Andy Greenberg — May 28th 2022 at 13:00
Plus: A $150 million Twitter fine, a massive leak from a Chinese prison in Xinjiang, and an ISIS plot to assassinate George W. Bush.
☐ ☆ ✇ WIRED

An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

By Lily Hay Newman — June 3rd 2022 at 14:14
The company continues to downplay the severity of the Follina vulnerability, which remains present in all supported versions of Windows.
☐ ☆ ✇ WIRED

Google May Owe You a Chunk of $100 Million

By Andrew Couts — June 4th 2022 at 13:00
Plus: The US admits to cyber operations supporting Ukraine, SCOTUS investigates its own, and a Michael Flynn surveillance mystery is solved.
☐ ☆ ✇ WIRED

The Hacker Gold Rush That's Poised to Eclipse Ransomware

By Lily Hay Newman — June 5th 2022 at 11:00
As governments crack down on ransomware, cybercriminals may soon shift to business email compromise—already the world's most profitable type of scam.
☐ ☆ ✇ WIRED

AlphaBay Is Taking Over the Dark Web—Again

By Andy Greenberg — June 6th 2022 at 13:46
Five years after it was torn offline, the resurrected dark web marketplace is clawing its way back to the top of the online underworld.
☐ ☆ ✇ WIRED

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

By Lily Hay Newman — June 7th 2022 at 13:00
MongoDB claims its new “Queryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.
☐ ☆ ✇ WIRED

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

By Dan Goodin, Ars Technica — June 9th 2022 at 20:20
A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.
☐ ☆ ✇ WIRED

Conti's Attack Against Costa Rica Sparks a New Ransomware Era

By Matt Burgess — June 12th 2022 at 11:00
A pair of ransomware attacks crippled parts of the country—and rewrote the rules of cybercrime.
☐ ☆ ✇ WIRED

Russia Is Taking Over Ukraine’s Internet

By Matt Burgess — June 15th 2022 at 11:00
In occupied Ukraine, people’s internet is being routed to Russia—and subjected to its powerful censorship and surveillance machine.
☐ ☆ ✇ WIRED

Police Linked to Hacking Campaign to Frame Indian Activists

By Andy Greenberg — June 16th 2022 at 11:00
New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.
☐ ☆ ✇ WIRED

Here’s Why You’re Still Stuck in Robocall Hell

By Lily Hay Newman — June 17th 2022 at 11:00
Despite major progress fighting spam and scams, the roots of the problem go far deeper than your phone company’s defenses.
☐ ☆ ✇ WIRED

An Alleged Russian Spy Was Busted Trying to Intern at The Hague

By Matt Burgess — June 18th 2022 at 13:00
Plus: Firefox adds new privacy protections, a big Intel and AMD chip flaw, and more of the week’s top security news.
☐ ☆ ✇ WIRED

The Ghost of Internet Explorer Will Haunt the Web for Years

By Lily Hay Newman — June 20th 2022 at 11:00
Microsoft's legacy browser may be dead—but its remnants are not going anywhere, and neither are its lingering security risks.
☐ ☆ ✇ WIRED

Google Warns of New Spyware Targeting iOS and Android Users

By Lily Hay Newman — June 23rd 2022 at 17:30
The spyware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.
☐ ☆ ✇ WIRED

The Post-Roe Privacy Nightmare Has Arrived

By Andrew Couts — June 25th 2022 at 13:00
Plus: Microsoft details Russia’s Ukraine hacking campaign, Meta’s election integrity efforts dwindle, and more.
☐ ☆ ✇ WIRED

You Need to Update Windows and Chrome Right Now

By Kate O'Flaherty — June 30th 2022 at 11:00
Plus: Google issues fixes for Android bugs. And Cisco, Citrix, SAP, WordPress, and more issue major patches for enterprise systems.
☐ ☆ ✇ WIRED

A New, Remarkably Sophisticated Malware Is Attacking Routers

By Dan Goodin, Ars Technica — June 30th 2022 at 13:00
Researchers say the remote-access Trojan ZuoRAT is likely the work of a nation-state and has infected at least 80 different targets.
☐ ☆ ✇ WIRED

The Worst Hacks and Breaches of 2022 So Far

By Lily Hay Newman — July 4th 2022 at 11:00
From cryptocurrency thefts to intrusions into telecom giants, state-backed attackers have had a field day in the year’s first half.
☐ ☆ ✇ WIRED

How to Avoid the Worst Instagram Scams

By Matt Burgess — July 6th 2022 at 11:00
Fake sellers. Competitions. Crypto cons. There are plenty of grifts on the platform, but you don’t have to get sucked in.
☐ ☆ ✇ WIRED

Apple’s Lockdown Mode Aims to Counter Spyware Threats

By Lily Hay Newman — July 6th 2022 at 17:04
Starting with iOS 16, people who are at risk of being targeted with spyware will have some much-needed help.
☐ ☆ ✇ WIRED

Will These Algorithms Save You From Quantum Threats?

By Amit Katwala — July 8th 2022 at 15:10
Quantum-proof encryption is here—decades before it can be put to the test.
☐ ☆ ✇ WIRED

Chinese Police Exposed 1B People's Data in Unprecedented Leak

By Lily Hay Newman — July 9th 2022 at 13:00
Plus: A duplicitous bug bounty scheme, the iPhone's new “lockdown mode,” and more of the week's top security news.
☐ ☆ ✇ WIRED

New ‘Retbleed’ Attack Can Swipe Key Data From Intel and AMD CPUs

By Dan Goodin, Ars Technica — July 13th 2022 at 16:00
The exploit can leak password information and other sensitive material, but the chipmakers are rolling out mitigations.
☐ ☆ ✇ WIRED

A New Attack Can Unmask Anonymous Users on Any Major Browser

By Lily Hay Newman — July 14th 2022 at 11:00
Researchers have found a way to use the web's basic functions to identify who visits a site—without the user detecting the hack.
☐ ☆ ✇ WIRED

Amazon Handed Ring Videos to Cops Without Warrants

By Matt Burgess — July 16th 2022 at 13:00
Plus: A wild Indian cricket scam, an elite CIA hacker is found guilty of passing secrets to WikiLeaks, and more of the week's top security news.
☐ ☆ ✇ WIRED

Instagram Slow to Tackle Bots Targeting Iranian Women’s Groups

By Lily Hay Newman — July 19th 2022 at 19:40
Despite alerting Meta months ago, feminist groups say tens of thousands of fake accounts continue to bombard them on the platform.
☐ ☆ ✇ WIRED

The 2022 US Midterm Elections' Top Security Issue: Death Threats

By Lily Hay Newman — July 21st 2022 at 14:52
While cybersecurity and foreign meddling remain priorities, domestic threats against election workers have risen to the top of the list.
☐ ☆ ✇ WIRED

The January 6 Secret Service Text Scandal Turns Criminal

By Lily Hay Newman — July 23rd 2022 at 13:00
Plus: The FCC cracks down on car warranty robocalls, Thai activists get targeted by NSO's Pegasus, and the Russia-Ukraine cyberwar continues.
☐ ☆ ✇ The Hacker News

Three Common Mistakes That May Sabotage Your Security Training

By The Hacker News — August 4th 2022 at 07:58
Phishing incidents are on the rise. A report from IBM shows that phishing was the most popular attack vector in 2021, resulting in one in five employees falling victim to phishing hacking techniques. The Need for Security Awareness Training  Although technical solutions protect against phishing threats, no solution is 100% effective. Consequently, companies have no choice but to involve their
☐ ☆ ✇ WIRED

A New Attack Easily Knocked Out a Potential Encryption Algorithm

By Dan Goodin, Ars Technica — August 3rd 2022 at 13:00
SIKE was a contender for post-quantum-computing encryption. It took researchers an hour and a single PC to break it.
☐ ☆ ✇ WIRED

The Microsoft Team Racing to Catch Bugs Before They Happen

By Lily Hay Newman — August 3rd 2022 at 16:43
What's it like to be responsible for a billion people's digital security? Just ask the company's Morse researchers.
☐ ☆ ✇ WIRED

An Attack on Albanian Government Suggests New Iranian Aggression

By Lily Hay Newman — August 4th 2022 at 21:30
A Tehran-linked hack of a NATO member marks a significant escalation against the backdrop of US-Iran nuclear talks.
☐ ☆ ✇ WIRED

A Slack Bug Exposed Some Users’ Hashed Passwords for 5 Years

By Lily Hay Newman — August 5th 2022 at 22:09
The exposure of cryptographically scrambled passwords isn’t a worst-case scenario—but it isn’t great, either.
☐ ☆ ✇ WIRED

The US Emergency Alert System Has Dangerous Flaws

By Andrew Couts — August 6th 2022 at 13:00
Plus: A crypto-heist extravaganza, a peek at an NSO spyware dashboard, and more.
☐ ☆ ✇ WIRED

GitHub Moves to Guard Open Source Against Supply Chain Attacks

By Lily Hay Newman — August 8th 2022 at 23:19
The popular Microsoft-owned code repository plans to roll out code signing, which will help beef up the security of open source projects.
☐ ☆ ✇ WIRED

One of 5G’s Biggest Features Is a Security Minefield

By Lily Hay Newman — August 9th 2022 at 22:46
New research found troubling vulnerabilities in the 5G platforms carriers offer to wrangle embedded device data.
☐ ☆ ✇ WIRED

The Hacking of Starlink Terminals Has Begun

By Matt Burgess — August 10th 2022 at 14:00
It cost a researcher only $25 worth of parts to create a tool that allows custom code to run on the satellite dishes.
☐ ☆ ✇ WIRED

Google's Android Red Team Had a Full Pixel 6 Pwn Before Launch

By Lily Hay Newman — August 10th 2022 at 21:38
Before the flagship phone ever landed in users’ hands, the security team thoroughly hacked it by finding bugs and developing exploits.
☐ ☆ ✇ WIRED

Sloppy Software Patches Are a ‘Disturbing Trend’

By Lily Hay Newman — August 11th 2022 at 17:28
The Zero Day Initiative has found a concerning uptick in security updates that fail to fix vulnerabilities.
☐ ☆ ✇ WIRED

The US Offers a $10M Bounty for Intel on Conti Ransomware Gang

By Matt Burgess — August 11th 2022 at 18:09
The State Department organization has called for people to share details about five key members of the hacking group.
☐ ☆ ✇ WIRED

Zoom’s Auto-Update Feature Came With Hidden Risks on Mac

By Lily Hay Newman — August 12th 2022 at 20:34
The popular video meeting app makes it easy to keep the software up to date—but it also introduced vulnerabilities.
☐ ☆ ✇ WIRED

A Single Flaw Broke Every Layer of Security in MacOS

By Matt Burgess — August 12th 2022 at 23:00
An injection flaw allowed a researcher to access all files on a Mac. Apple issued a fix, but some machines may still be vulnerable.
☐ ☆ ✇ WIRED

Flaw in the VA Medical Records Platform May Put Patients at Risk

By Lily Hay Newman — August 13th 2022 at 19:33
The Veterans Affairs’ VistA software has a vulnerability that could let an attacker “masquerade as a doctor,” a security researcher warns.
☐ ☆ ✇ WIRED

A New Tractor Jailbreak Rides the Right-to-Repair Wave

By Lily Hay Newman — August 14th 2022 at 01:31
A hacker has formulated an exploit that provides root access to two popular models of the company’s farm equipment.
☐ ☆ ✇ WIRED

Spyware Hunters Are Expanding Their Tool Set

By Lily Hay Newman — August 18th 2022 at 21:42
This invasive malware isn’t just for phones—it can target your PC too. But a new batch of algorithms aims to weed out this threat.
☐ ☆ ✇ WIRED

Janet Jackson’s ‘Rhythm Nation’ Can Crash Old Hard Drives

By Lily Hay Newman — August 20th 2022 at 13:00
Plus: The Twilio hack snags a reporter, a new tool to check for spyware, and the Canadian weed pipeline gets hit by a cyberattack.
☐ ☆ ✇ WIRED

Inside the World’s Biggest Hacker Rickroll

By Matt Burgess — August 22nd 2022 at 11:00
As a graduation prank, four high school students hijacked 500 screens across six school buildings to troll their classmates and teachers.
☐ ☆ ✇ WIRED

Why the Twilio Breach Cuts So Deep

By Lily Hay Newman — August 26th 2022 at 20:05
The phishing attack on the SMS giant exposes the dangers of B2B companies to the entire tech ecosystem.
☐ ☆ ✇ WIRED

Apple Fixed a Serious iOS Security Flaw—Have You Updated Yet?

By Kate O'Flaherty — August 31st 2022 at 11:00
Plus: Chrome patches another zero-day flaw, Microsoft closes up 100 vulnerabilities, Android gets a significant patch, and more.
☐ ☆ ✇ WIRED

A Windows 11 Automation Tool Can Easily Be Hijacked

By Matt Burgess — September 2nd 2022 at 11:00
Hackers can use Microsoft’s Power Automate to push out ransomware and key loggers—if they get machine access first.
☐ ☆ ✇ WIRED

TikTok Users Were Vulnerable to a Single-Click Attack

By Dan Goodin, Ars Technica — September 2nd 2022 at 13:00
Microsoft disclosed the flaw in the Android app’s deep link verification process, which has since been fixed.
☐ ☆ ✇ WIRED

Police Across US Bypass Warrants With Mass Location-Tracking Tool

By Lily Hay Newman — September 3rd 2022 at 13:00
Plus: An unsecured database exposed face recognition data in China, ‘Cuba’ ransomware knocks out Montenegro, and more.
☐ ☆ ✇ WIRED

iOS 16 Has 2 New Security Features for Worst-Case Scenarios

By Lily Hay Newman — September 12th 2022 at 11:00
Safety Check and Lockdown Mode give people in vulnerable situations ways to quarantine themselves from acute risks.
☐ ☆ ✇ WIRED

Ukraine’s Cyberwar Chief Sounds Like He’s Winning

By Chris Stokel-Walker — September 14th 2022 at 11:00
Yurii Shchyhol gives WIRED a rare interview about running the country’s Derzhspetszviazok and the state of the online conflict with Russia.
☐ ☆ ✇ WIRED

US Border Agents May Have a Copy of Your Text Messages

By Andrew Couts — September 17th 2022 at 13:00
Plus: An AI artist exposes surveillance of Instagram users, the US charges Iranians over a ransomware campaign, and more.
☐ ☆ ✇ WIRED

The Deep Roots of Nigeria’s Cybersecurity Problem

By Olatunji Olaigbe — September 19th 2022 at 11:00
Despite having one of the strongest data-protection policies in Africa, the country’s enforcement and disclosure practices remain dangerously broken.
☐ ☆ ✇ WIRED

A New Linux Tool Aims to Guard Against Supply Chain Attacks

By Lily Hay Newman — September 22nd 2022 at 14:46
Security firm Chainguard has created a simple, open source way for organizations to defend the cloud against some of the most insidious attacks.
☐ ☆ ✇ WIRED

Slack’s and Teams’ Lax App Security Raises Alarms

By Andy Greenberg — September 23rd 2022 at 16:52
New research shows how third-party apps could be exploited to infiltrate these sensitive workplace tools.
☐ ☆ ✇ WIRED

The Dire Warnings in the Lapsus$ Hacker Joyride

By Lily Hay Newman — September 27th 2022 at 11:00
The fun-loving cybercriminals blamed for breaches of Uber and Rockstar are exposing weaknesses in ways others aren't.
❌