* 10 cybersecurity myths inside corporate culture

TechViews news   …..

There are a lot of misconceptions out there concerning the importance of cybersecurity. Most people just hear the term and think it is someone else’s responsibility. But the most common misconceptions about cybersecurity may surprise you. See if you’ve heard a few of these myths and what the truth is.

Myth #1: The only worthwhile targets are large corporations

Everyone is a target and no one is immune from cybercrime’s impact. Of the companies that experienced cyberattacks in 2016, 31% were small and mid-sized companies that had less than 250 employees.

Myth #2: Users aren’t facing that many threats in a given day

The average organization with 1,000 to 3,000 employees will see anywhere from 11 to 20 incidents in a single day. Larger organizations that have 3,001 to 5,000 employees? Well, they’re a bit busier and see 21 to 30 incidents a day. The largest organizations that have 5,001+ employees will see 31 to 50 incidents in any given day, all according to McAfee Labs’ Threats Report.

Myth #3: Outsiders are the bad guys

Though you may not want to think about your own staff and users acting against you, it happens more often than most people realize. Roughly a third of all incidents are actually caused by insiders, whether that’s due to negligence, accident, or actual malicious intent. This number is backed up both by a Radware report and a study conducted by Verizon.

Continue reading


*New Android Malware Infects Over 36.5 Million Phones

TechViews News   …..

Security researchers at Check Point Security recently discovered a malware scam in Google’s Play Store. The malware dubbed “Judy” has been hiding behind the scenes on 41 specific apps that have been available in the Play Store for years, so it’s unclear how long they have been infecting devices.

The malicious apps were developed by the Korean company, Kiniwini, listed in the Play Store as ENISTUDIO corp. The impacted apps have been downloaded millions of times and may have been spread to over 36 million users.

Moreover, the researchers also uncovered a few more apps, published by other developers on the Apple Store, inexplicably containing the same the malware in them. The connection between the two campaigns remains unclear, though researchers believe it is possible that one developer borrowed code from the other.

This is how it works — the user downloads an app from the Play Store and at that point, it’s not malicious. But once the user opens the app, it connects to its Command and Control server (C&C) and installs the malicious code.

Continue reading

*US Government starting to crack down on fake ‘tech support’ lines

TechViews News   …..

It’s happened to all of us … we click on a bogus link and up pops an equally bogus blue screen claiming our computer has been compromised and we need to call a toll free “Microsoft” support line to get help.

Then sometimes we even get a loud voice telling us NOT to leave the page or our computer will stop working. The voice is adamant that we must call Microsoft right then to keep the Internet safe from whatever bogus nasty thing has infected our computer.


This is one of the most common scams on the internet, yet thousands of people fall for it every week. Of course it wasn’t Microsoft and the pop up was fraudulent.

Continue reading

* Are average computer users a factor in the WannaCry ransomware attack?

TechViews news   …..

Cybersecurity experts are clamoring to contain the massive global ransomware attack that infected several hundred thousand computers over the weekend in more than 150 countries. While the attacks have mainly struck large businesses, should the smaller home user be concerned?

The attack that began on Friday — known as WannaCry — is believed to be the largest cyber exploitation attack recorded. It was responsible for crippling Britain’s hospital network and Germany’s railway, along with other governments and infrastructures worldwide. And oddly, Russia seems to be the worst hit of all affected countries.

Continue reading

*Google Chrome users now vulnerable to tricky new technique

TechViews News   …..

There is a new malware attack involving bait-and-switch websites that affects Google Chrome users.

This is how the malware scam works:

  1. You must be using the Chrome Browser on a Windows computer.
  2. You must live in an English speaking country. As of now it’s just the U.S., U.K., Canada and Australia that are being targeted.
  3. You are sent to the malicious bait-and-switch website through a search engine (Google, Bing, etc.).

If all of these factors are in place, you could fall victim to this attack.

Hackers are inserting JavaScript into unsecure websites. If you’re using the Chrome browser and click the link from a search engine result, the Java Script makes the website unreadable. You will see random symbols that look like gibberish that will make it totally unreadable.

Continue reading

*30 security terms you need to know to protect yourself online

TechViews news   …..

Cyberattacks have been on the rise for the past several years and 2017 shows no signs of letting up. But, these days, online threats go far beyond your computer getting a virus. If you don’t know what threats are out there, protecting yourself will be a challenge. That’s why I’ve rounded up 30 terms you need to know if you want to safeguard your online privacy and security.

Two terms before we begin

Each of the terms we’re about to go over all fall under the umbrella of two terms you need to understand. The first is “Cyberattack” and the second is “Cybersecurity.”


Simply put, a cyberattack is any attempt by an outside source to target, steal from, spy on, damage or destroy a computer network. Cyberattacks come in all shapes and sizes (as you’re about to see), and the criminals behind them don’t set their sights on a single target. No home network is too small, or company too large, to fall victim.


Cybersecurity, on the other hand, is the act of protecting networks from cyberattacks. Whether it’s locking down your personal network at home, or hiring a staff of IT professionals to secure the network for your business, cybersecurity is increasingly becoming a challenging task. To beat cybercriminals, you have to always be one step ahead of the game.

Ready? here we go ……

A Glossary of Cybersecurity Terms:

Continue reading

*WhatsApp users are being targeted with new malware

TechViews News   …..

Some users of the WhatsApp messaging service have had their banking credentials stolen by hackers. Cybercriminals are sending a virus to WhatsApp customers disguised as legitimate-looking documents.

How the latest WhatsApp scam works

Hackers are beginning to send malicious links in the form of Microsoft Excel or PDF files, or a Word document. If you click on the malicious link, the virus allows the scammer to browse through your computer or wireless device with the goal of stealing your banking credentials, including PIN codes, and other personal information from your gadget.

Continue reading