Yahoo has announced that they have discovered a historical hack from August 2013 which surpasses their own previously set record of 500 million accounts, set only months earlier in September. This is an act that they claimed had been conducted by an ‘unnamed’ government.
Users have reported receiving suspicious JPEG files in personal messages through social media networks like Facebook & LinkedIn which contain Ransomware.
Sent via personal messages, these image files trigger an automatic download when clicked on. This downloaded file contains Ransomware.
This particular strain of Ransomware known as ‘Locky’ is activated as soon as the unsuspecting victim clicks on the downloaded image. As soon as this happens they find that all of their files on their computer have become encrypted and are no longer accessible.
A report by security researchers MalwareBytes has identified a dangerous new form of Adware which masquerades as the Google Chrome Browser.
The Google Chrome copycat named ‘eFast Browser’ is a form of Adware which replicates the look and feel of Chrome to trick users into thinking they are using the official thing.
Upon installation, eFast attempts to delete Chrome, removing desktop and taskbar shortcuts and replacing them with its own, which look similar.
Weebly, which is based in San Francisco, has begun notifying customers of a serious data breach which occurred earlier this year. According to LeakedSource, over 43,000,000 customers had their details stolen with usernames, email addresses, passwords and IP addresses all obtained.
Despite an ever increasing number of online attacks being reported in the media and harrowing new cyber threats like Ransomware being created, many companies are still failing to take effective action to improve their online security. As well as failing to keep their anti-virus software and firewalls up to date, they also fail to educate their workforce on the latest threats - a key part of securing their operations.
Phishing scams are one of the most common forms of fraud committed online today. They involve tricking an email recipient into handing over sensitive data and trusted information. A hacker may send an email which looks as if it has been sent by a supplier, a company that you work with on a regular basis, a service provider or even another employee in your own business. So they aren’t always obvious. They hacker may then try and encourage the recipient to download a piece of software, visit an unsafe website or supply them directly with sensitive information that they can exploit.
ECL are a provider of reliable, high quality IT support to the business communities of South East Essex and neighbouring regions
Windows 10 has enhanced passwords with PIN entry and a new 'Picture' password included.
Alongside the traditional word-based & PIN options, 'Picture' passwords are a brand new feature.
The 'Picture' password is akin to the 'Pattern Lock' on Android phones which asks users to swipe their finger to register a specific pattern.
It asks the user to select a photo and then draw a pattern on top of it. For example, on a photo of your house you might be asked to swipe from the letterbox to the chimney.
A slow computer can be incredibly frustrating but before you fork out for an expensive new laptop or PC computer you should consider trying out a few of these tried and trusted techniques below. Often speeding up your computer can be easier and less costly than you might expect.