The cyber attack affects 14 inboxes belonging to the Department of Justice was confirmed by ESET researchers. ESET’s team of malware researchers in Montreal, in collaboration with journalist Hugo Joncas, helped shed light on a cyber attack that affected the Quebec Department of Justice. Indeed, on August 11 and 12, the Department of Justice suffered a cyber attack in which malicious actors used malicious software to infect 14 inboxes under the Department‘s … More Emotet strikes Quebec’s Department of Justice: An ESET Analysis
What are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown? When it comes to coercing people into parting with their money, cybercriminals seem to have an endless bag of tricks to choose from. There are some tricks, that they favor more than others, … More 5 ways cybercriminals can try to extort you
While wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised. External data storage devices have been around almost as long as computers have existed. Magnetic tape and floppy disks, which were once the dominant media, are now mostly fond … More Plugging in a strange USB drive – What could possibly go wrong?
Throughout the 1990’s we saw vastly increased engineering being applied to sports, mostly in the development of shoes, clothing and equipment – everything from ice skates to bikes and even golf balls. But among all the bling of bubbles and pumps in shoes and aerodynamic helmets and balls, another transformation was taking place, the democratization … More Sports data for ransom – it’s not all just fun and games anymore
Zoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication. Zoom is rolling out support for two-factor authentication (2FA) across its web, desktop, and mobile applications, allowing users to double down on the security of their accounts with an extra layer of protection. For context, 2FA systems require users to pass authentication … More Zoom makes 2FA available for all its users