Top 10 Cyber Security Tools for Small Businesses

Small businesses have few options for cyber security tools and even fewer resources to deploy and manage them. You must choose wisely to carefully balance low cost, ease of use, and high impact on the security posture of the organization. So what security tools should small businesses focus on? A SANS research paper has 10 suggestions for SMB security tools. The…

4 Types of Social Engineering Used Every Day

Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when “persuasion” takes a darker turn. In a broad sense, it includes any action that attempts to influence a person to act against their best interests. Technically, acts that influence people…

Chinese Hackers Spread Android Banking Trojan Using Fake Cellphone Tower

According to a Check Point Software blog, Chinese hackers using a rogue cell phone tower, have taken smishing to the next level. The hackers ar distributing Android banking malware via spoofed SMS messages from these rogue cell towers. Security researchers at Check Point discovered that Chinese hackers are using fake base transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android…

Potential phone scam on those who say ‘yes’

WASHINGTON — Falling victim to a scam, apparently, can be as simple as just saying “yes.”  The Better Business Bureau and several law enforcement agencies are warning of a potential phone scam that involves a caller asking, “Can you hear me?”  As the victim answers “yes,” his or her reply is recorded. That enables the scammer, the BBB said, to use the recorded answer for signing up the victim for a product or service — and then demand payment. Scammers also can use the recorded answer to confirm a purchase agreement if it is ever disputed. Even though some people have reported…