Posts

Showing posts from October, 2020

How to Protect Yourself Against Scams?

Image
The world is more and more complicated to live, everyone realizes it.  On the Internet, we sometimes feel like we are in the middle of a battlefield and we don't know how to protect ourselves against the myriad threats.  Small survival guide in several parts ... Your beloved Panoptinet site is not immune to attacks, far from it.  Protecting it against flooding attempts, malicious content in comments and keeping it in working order is an ongoing struggle.  This activity leaves us too little time to enrich the content of the site.  Alas. From the moment a site obtains certain popularity, which is the case of Panoptinet with more than 7.7 million users since its creation, it becomes the target of spammers and scammers of all kinds.  Make no mistake, the target is always you: the readers.  The site is then one of the vectors of an attack. We are not going to make a list of the attacks that target you but, over time, give you as many keys as possible to help you protect yourself.  And y

Bluetooth Flaw Allows Hacking Android Smartphones (But Don't Panic)

Image
A bug made it possible to use the Bluetooth of an Android smartphone to install malware. But it is already fixed, and was, in any case, relatively difficult to set up. This is a critical flaw! Which also allows you to spread malware on your Android smartphone! Even though both of these alerts are true, don't worry. As usual in the cybersecurity information circuit, the flaw was discovered and repaired before it was even made public.  You just need to keep your smartphone up to date to protect yourself from it. That's not all: the cybersecurity researchers who discovered it have not made public their method of exploiting it. There is therefore no indication that thugs know how to take advantage of this flaw. And even if it allows for highly developed attacks, it is actually complicated to set up. A POWERFUL ATTACK ... Thanks to this flaw, a hacker can go through the Bluetooth of an Android smartphone to install malware, remotely, and discreetly. He does not need any acti

What is Vulnerable & SMBGhost ? How To Protect With Total security

Image
More than 100 Thousand Systems are Still Vulnerable to SMBGhost Microsoft fixed the SMBGhost vulnerability (CVE-2020-0796) in Windows SMBv3 back in March this year, but more than 100 thousand systems are still vulnerable. SMBGhost affects Windows 10 and Windows Server 2019, and CVSS scored a maximum of 10 on the CVSS vulnerability rating scale. The vulnerability exists in version 3.1.1 of the Microsoft Server Message Block (SMB) protocol, the same one used by cybercriminals to distribute ransomware WannaCry in 2017. As a fix for the vulnerability, Microsoft has released KB4551762 update for Windows 10 (versions 1903 and 1909) and Windows Server 2019 (versions 1903 and 1909). Alternatively, the company also suggested that administrators disable SMBv3 compression using PowerShell. To protect clients from external attacks, you must block TCP port 445 at the network perimeter border. Due to this, Kopriva also checked through Shodan how many IP addresses with open ports 445 are available ov

What is SMS and Smartphone Chat Phishing?

Image
The rise of mobile messaging services - Facebook Messenger and WhatsApp in particular - has provided phishers with a new method of attack.  Attackers don't even need to use email or instant messaging applications to achieve their end goal of distributing malware or stealing credentials.  The internet-connected nature of modern communications makes text messages an effective attack vector as well. SMS - or smishing - phishing attacks work much the same way as email attacks.  They present the victim with a fraudulent offer or a false warning to induce them to click on a malicious URL. The nature of SMS makes the phishing message short and designed to grab the attention of the victim, often with the goal of getting them to click on the phishing URL.  A common attack by smashers is to impersonate a bank and fraudulently warn the victim that their account has been closed or that they have withdrawn money. The truncated nature of the message often does not provide the victim with enough

What is Phishing? How to Protect Yourself From Fraudulent Emails | Complete Security

Image
Technology:   Do not click on this email!  Here's everything you need to know in this guide to phishing, including how to protect yourself against one of the most common forms of cyberattack. Phishing, a Definition Usually carried out through email - although this type of attack also includes phone calls (known as "vishing"), social media, messaging services (aka "smishing") and applications - an attack phishing scam tries to trick the target into doing what the scammer wants.  This could be passing on passwords to facilitate hacking a business or changing bank details so that payments go to scammers instead of going to the correct account. Phishing is also a popular method for cyber attackers to deliver malware, by encouraging victims to download a document or visit a link that will covertly install the malicious payload in attacks that could distribute Trojans, ransomware,  or all kinds of damaging and disruptive attacks. The precise purpose and mechanism vary

Spam and Phishing Mails Protect With Total Security

Image
Spam is the electronic equivalent of a paper advertisement that is dropped into your inbox. However, spam isn't just annoying and annoying. It is dangerous, especially if it is part of phishing. Spam is sent in huge quantities by email by spammers and cybercriminals who aim to: ·          extort money from a number of recipients who replied to the message; ·          Conduct a phishing attack to fraudulently obtain passwords, credit card numbers, bank credentials, etc. ·          Distribute malicious code to recipient computers. How to Protect Yourself from Spam and Phishing Here are some useful tips from a team of Total security experts from Protegent360  to help you reduce the amount of spam in your inbox. ·          Get Yourself Multiple Email Addresses It's best to have at least two email addresses.   o     Personal Email Address this address should only be used for personal correspondence. Since spammers create lists of possible email addresses (using

Can we Protect For Computer Virus | Antivirus

Image
Despite the fact that it is no longer possible to imagine modern life without computers, many people still do not realize the huge risks associated with constant interaction with technology. Computer viruses are one of the oldest forms of malware  (that is, software designed to do harm), but their ability to evade detection and replicate themselves means that these programs will always be a cause for concern. Understanding what a virus can do to your computer is the first step to keeping your system safe and protecting your family from attacks. The Potential Of a Computer Virus The only definite sign of software that can be called a "virus" is the ability to copy itself to other computers. This means that not all viruses pose a direct threat to your computer, hidden viruses often allow cybercriminals and hackers to install more malicious programs such as  Worms  and  Trojan. Regardless of how the virus is going to manifest itself, its actions consume system resources.  This s