Malware

Cyber Security - Tech Patrol

Top 3 Social Engineered Methods Used By Cyber Criminals

The target of Cyber Criminals has now shifted from email techniques to much more developed and targeted social media engineered attacks. Social engineered techniques used by Cyber Criminals allows them the ability to access networks, systems or data by exploiting human psychology and curiosity, rather than using technical hacking techniques. Using a variety of methods, …

Top 3 Social Engineered Methods Used By Cyber Criminals Read More »

Dark Web

10 Dark Web Warning Signs Your Organisation Has Been Breached

The Dark Web is a place where the majority of illegal cyber activity takes place and it’s where almost all cyber breached data is traded and sold. Here are 10 activities that take place on the Dark Web that organisations should watch out for.    Cyber breaches continue to be increasingly dangerous for organisations around the world …

10 Dark Web Warning Signs Your Organisation Has Been Breached Read More »

Crystal Eye

All-In-One Threat Management System For SMEs (Australian Made)

Red Piranha and Australian based company have launched ‘Crystal Eye’, the first generation firewall developed from SIA blockchain technology. Red Piranha believes the SIA Blockchain storage technology is ideal for log storage having the capacity to create detailed storage ledgers and will reduce the cost of log storage by over 50% compared to other traditional …

All-In-One Threat Management System For SMEs (Australian Made) Read More »

cyber security

How To Build A Cyber Security Culture Within Your Business

There were more than 14.5 Billion malware-laced emails sent in 2017, and if that isn’t scary enough there was a 1,000-percent increase in phishing efforts, according to AppRiver’s annual Global Security Report. Just one attack affecting 143 Million people. The report also notes that 1.9 Billion data records were lost or stolen as a result of …

How To Build A Cyber Security Culture Within Your Business Read More »

Cyber Security

Top 5 IT Security Skills SMBs Need In 2018 (chart)

Across the board, small and medium-sized businesses (SMBs) trail their larger counterparts in their need for skill improvement, specifically when it comes to IT security. However, SMBs can look to partner with managed services providers (MSPs) in order to bridge this skills gap and gain access to the expertise needed to stay protected, including these …

Top 5 IT Security Skills SMBs Need In 2018 (chart) Read More »

Bluetooth Hack

New Bluetooth Hack Affects Millions Of Major Vendor Devices

The security vulnerability is related to two particular Bluetooth features – Bluetooth low energy (LE) which looks at the implementations of Secure Connections Pairing in operating system software, and EDR which has to do with the implementations of Secure Simple Pairing in device firmware.  Bluetooth hacking techniques have been tried since the technology was released …

New Bluetooth Hack Affects Millions Of Major Vendor Devices Read More »

Tech Patrol

Singapore Data Hackers Steal 1.5M Of Personal Data (quarter of the population including the Prime Minister!)

Local hackers in Singapore have stolen over 1.5 Million residents personal data, or around a quarter of the countries population, through an attack on SingHealthm – according to officials.    The “Deliberate, targeted and well-planned” attack, according to a Singaporean Government statement. The breach was executed when hackers broke into the country’s Government health database creating …

Singapore Data Hackers Steal 1.5M Of Personal Data (quarter of the population including the Prime Minister!) Read More »

New Virus Decides If Your Computer Is Best Suited For Ransomware or Crypto Mining

Security researchers in Russia has found a unique piece of Malware that infects systems with either ransomware or Cryptocurrency mining tools, depending upon they configurations to decide which of the two schemes could be more profitable on your device. Ransomware is a type of malware that systematically locks down your computer and prevents you from …

New Virus Decides If Your Computer Is Best Suited For Ransomware or Crypto Mining Read More »

Panda-Banker-Malware-Tech-Patrol

PANDA Banker Malware Targeting Financial Institution, Cryptocurrency Exchanges And Social Media

In March, security researchers at Arbor Networks discovered a threat targeting financial institutions in Japan using the latest variant of the Panda Banker banking malware also known as Zeus Panda & PandaBot. Researchers at security firm F5 recently detected several campaigns leveraging the Panda Banker malware to other institutions around the world including the largest …

PANDA Banker Malware Targeting Financial Institution, Cryptocurrency Exchanges And Social Media Read More »

malware-tech-success-page-3
Scroll to Top