<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security Plus</title>
	<atom:link href="https://cybersecurityplus.co.uk/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecurityplus.co.uk/</link>
	<description></description>
	<lastBuildDate>Tue, 27 Feb 2024 11:00:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://cybersecurityplus.co.uk/wp-content/uploads/2020/07/favicon-1-1-1-1.png</url>
	<title>Cyber Security Plus</title>
	<link>https://cybersecurityplus.co.uk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to spot scams like I Regret To Inform You About Some Sad News For You scam</title>
		<link>https://cybersecurityplus.co.uk/how-to-spot-scams-like-i-regret-to-inform-you-about-some-sad-news-for-you-scam/</link>
		
		<dc:creator><![CDATA[tonibennett]]></dc:creator>
		<pubDate>Tue, 27 Feb 2024 11:00:31 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://cybersecurityplus.co.uk/?p=2194</guid>

					<description><![CDATA[<p>What kind of scam is &#8220;I Regret To Inform You About Some Sad News For You&#8221;? After analysing this email, we determined that it is a sextortion scam threatening to share (disclose) videos of recipients visiting adult websites and their personal information. This email aims to trick recipients into sending a specified amount of Bitcoins </p>
<p>The post <a href="https://cybersecurityplus.co.uk/how-to-spot-scams-like-i-regret-to-inform-you-about-some-sad-news-for-you-scam/">How to spot scams like I Regret To Inform You About Some Sad News For You scam</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading" id="a1">What kind of scam is &#8220;I Regret To Inform You About Some Sad News For You&#8221;?</h3>



<p>After analysing this email, we determined that it is a sextortion scam threatening to share (disclose) videos of recipients visiting adult websites and their personal information. This email aims to trick recipients into sending a specified amount of Bitcoins to the provided wallet. None of the claims in this email are true. Thus, it must be ignored</p>



<figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" width="790" height="696" src="https://cybersecurityplus.co.uk/wp-content/uploads/2024/02/i-regret-to-inform-you-about-some-sad-news-for-you-email-scam-main.webp" alt="" class="wp-image-2196" style="width:840px;height:auto" srcset="https://cybersecurityplus.co.uk/wp-content/uploads/2024/02/i-regret-to-inform-you-about-some-sad-news-for-you-email-scam-main.webp 790w, https://cybersecurityplus.co.uk/wp-content/uploads/2024/02/i-regret-to-inform-you-about-some-sad-news-for-you-email-scam-main-300x264.webp 300w, https://cybersecurityplus.co.uk/wp-content/uploads/2024/02/i-regret-to-inform-you-about-some-sad-news-for-you-email-scam-main-768x677.webp 768w, https://cybersecurityplus.co.uk/wp-content/uploads/2024/02/i-regret-to-inform-you-about-some-sad-news-for-you-email-scam-main-530x467.webp 530w" sizes="(max-width: 790px) 100vw, 790px" /></figure>



<h3 class="wp-block-heading">More about the &#8220;I Regret To Inform You About Some Sad News For You&#8221; sextortion scam</h3>



<p>This email claims that access to a computer has been gained, and Internet activities have been observed. It states that an email account has been hacked. It also claims that the operating system has been infected with a Trojan that accessed the webcam, microphone, social network accounts, messengers, contact lists, downloaded photos, web browsing history, and other data.</p>



<p>The purpose of this email is to trick recipients into believing that compromising videos have been recorded and will be disclosed if $1490 in Bitcoins are not paid to the provided BTC wallet. It urges recipients to pay a ransom within 48 hours from receiving it.</p>



<p>It is worth mentioning that this email appears to be sent from the recipient&#8217;s address. Scammers behind it use a spoofing technique to trick unsuspecting recipients into believing that their email account has been hacked.</p>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Name</strong></td><td>I Regret To Inform You About Some Sad News For You Email Scam</td></tr><tr><td><strong>Threat Type</strong></td><td>Phishing, Scam, Social Engineering, Fraud</td></tr><tr><td><strong>Fake Claim</strong></td><td>Access to a computer has been gained, and sensitive material has been obtained</td></tr><tr><td><strong>Cyber Criminal Cryptowallet Address</strong></td><td>1r8KDQsoFUWLdV1D2L1vc66YibNDrrYys, bc1quv2l07cec2pluq6qgpv95fu990mjlm7ljqksky, bc1q549rwxx67lhhhfn4y9073t4pyah539pw09cf9a, 16bHkVFULVmxTGVi2XKpwzkt5KrRnThzPg, 1DnDfzKAjTYWcn6nCVfkXLh5RRaGBUZ7nE, 1EhjD4hzLpwuHVu52ScHTJASqPdkC6SD4, 1P5vLEEuGawo33WLs3pVdxTuyjqt7Ymf9C, bc1qrvdjenydph4da62uylmr77yhxx6vsaaps04hcq, 1GS1SRz3QBC1NUeuhu8EWkx37qQXanUxGG, bc1qtc62hlaa8hvsslv8mddgtt83qvzl7cxpmuafcs</td></tr><tr><td><strong>Symptoms</strong></td><td>Unauthorized online purchases, changed online account passwords, identity theft, illegal access of the computer.</td></tr><tr><td><strong>Distribution methods</strong></td><td>Deceptive emails, rogue online pop-up ads, search engine poisoning techniques, misspelled domains.</td></tr><tr><td><strong>Damage</strong></td><td>Loss of sensitive private information, monetary loss, identity theft.</td></tr><tr><td><strong>Malware Removal (Windows)</strong></td><td>To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.</td></tr></tbody></table></figure>



<figure class="wp-block-table"><table><tbody><tr><td><br />To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com <a href="https://www.pcrisk.com/about-us">read more</a>.</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Similar scams in general</h3>



<p>As a rule, scammers behind sextortion scams coerce recipients to pay a ransom for not sharing the obtained material (videos, photos, personal files/data). They claim that they have accessed a webcam, a microphone, or gained access to a computer in some other way. Most scammers demand to be paid in cryptocurrency (they provide a crypto wallet address in their email addresses).</p>



<p>Examples of similar emails are &#8220;<a href="https://www.pcrisk.com/removal-guides/23590-i-broke-into-your-computer-system-using-the-wireless-network-router-email-scam">I Broke Into Your Computer System Using The Wireless Network Router Email Scam</a>&#8220;, &#8220;<a href="https://www.pcrisk.com/removal-guides/23385-we-are-ukrainian-hackers-and-we-hacked-your-site-email-scam">We Are Ukrainian Hackers And We Hacked Your Site Email Scam</a>&#8220;, and &#8220;<a href="https://www.pcrisk.com/removal-guides/23291-your-system-has-been-hacked-with-a-trojan-virus-email-scam">Your System Has Been Hacked With A Trojan Virus Email Scam</a>&#8220;. It is important to know that email can be used as a channel for delivering malware.</p>



<h3 class="wp-block-heading">How do spam campaigns infect computers?</h3>



<p>When emails are used to spread malware, they contain malicious attachments or links. In both cases, threat actors use them to trick recipients into downloading and executing malware. Usually, such emails are disguised as important/official/urgent letters from legitimate entities.</p>



<p>Most commonly used files to distribute malware are PDF, Microsoft and other documents, JavaScript files, executables, ISO files, and archive files containing malicious files.</p>



<h3 class="wp-block-heading">How to avoid installation of malware?</h3>



<p>Do not trust irrelevant emails sent from unknown, suspicious addresses (e.g., emails sent from your address). Do not open files or links presented in emails of this kind. Files/links in such emails can be malicious. Use official websites and stores to download applications and files. Do not trust other sources.</p>



<p>Keep the operating system and installed programs up to date. Use functions/tools provided (created) by the official software developers to update and activate the installed software.</p>



<p>If you&#8217;ve already opened malicious attachments, we recommend running a scan with <a href="https://www.pcrisk.com/download-combo-cleaner-windows">Combo Cleaner Antivirus for Windows</a> to automatically eliminate infiltrated malware.</p>



<p>Text presented in the &#8220;I Regret To Inform You About Some Sad News For You&#8221; email letter:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Subject: Don&#8217;t miss your unsettled payment. Complete your debt payment now.</p>



<p>Hi there!</p>



<p>I regret to inform you about some sad news for you.<br />Approximately a month or two ago I have succeeded to gain a total access to all your devices utilized for browsing internet.<br />Moving forward, I have started observing your internet activities on continuous basis.</p>



<p>Go ahead and take a look at the sequence of events provided below for your reference:<br />Initially I bought an exclusive access from hackers to a long list of email accounts (in today&#8217;s world, that is really a common thing, which can arranged via internet).<br />Evidently, it wasn&#8217;t hard for me to proceed with logging in your email account (-).</p>



<p>Within the same week, I moved on with installing a Trojan virus in Operating Systems for all devices that you use to login to email.<br />Frankly speaking, it wasn&#8217;t a challenging task for me at all (since you were kind enough to click some of the links in your inbox emails before).<br />Yeah, geniuses are among us.</p>



<p>Because of this Trojan I am able to gain access to entire set of controllers in devices (e.g., your video camera, keyboard, microphone and others).<br />As result, I effortlessly downloaded all data, as well as photos, web browsing history and other types of data to my servers.<br />Moreover, I have access to all social networks accounts that you regularly use, including emails, including chat history, messengers, contacts list etc.<br />My unique virus is incessantly refreshing its signatures (due to control by a driver), and hence remains undetected by any type of antiviruses.</p>



<p>Hence, I guess by now you can already see the reason why I always remained undetected until this very letter&#8230;</p>



<p>During the process of compilation of all the materials associated with you,<br />I also noticed that you are a huge supporter and regular user of websites hosting nasty adult content.<br />Turns out to be, you really love visiting porn websites, as well as watching exciting videos and enduring unforgettable pleasures.<br />As a matter of fact, I was not able to withstand the temptation, but to record certain nasty solo action with you in main role,<br />and later produced a few videos exposing your masturbation and cumming scenes.</p>



<p>If until now you don&#8217;t believe me, all I need is one-two mouse clicks to make all those videos with everyone you know,<br />including your friends, colleagues, relatives and others.<br />Moreover, I am able to upload all that video content online for everyone to see.<br />I sincerely think, you certainly would not wish such incidents to take place, in view of the lustful things demonstrated in your commonly watched videos,<br />(you absolutely know what I mean by that) it will cause a huge adversity for you.</p>



<p>There is still a solution to this matter, and here is what you need to do:<br />You make a transaction of $1490 USD to my account (an equivalent in bitcoins, which recorded depending on the exchange rate at the date of funds transfer),<br />hence upon receiving the transfer, I will immediately get rid of all those lustful videos without delay.<br />After that we can make it look like there was nothing happening beforehand.<br />Additionally, I can confirm that all the Trojan software is going to be disabled and erased from all devices that you use. You have nothing to worry about,<br />because I keep my word at all times.</p>



<p>That is indeed a beneficial bargain that comes with a relatively reduced price,<br />taking into consideration that your profile and traffic were under close monitoring during a long time frame.<br />If you are still unclear regarding how to buy and perform transactions with bitcoins &#8211; everything is available online.</p>



<p>Below is my bitcoin wallet for your further reference: 1r8KDQsoFUWLdV1D2L1vc66YibNDrrYys</p>



<p>All you have is 48 hours and the countdown begins once this email is opened (in other words 2 days).</p>



<p>The following list includes things you should remember and avoid doing:<br />&gt; There&#8217;s no point to try replying my email (since this email and return address were created inside your inbox).<br />&gt; There&#8217;s no point in calling police or any other types of security services either. Furthermore, don&#8217;t you dare sharing this info with any of your friends.<br />&nbsp;If I discover that (taking into consideration my skills, it will be really simple, because I control all your systems and continuously monitor them) &#8211;<br />&nbsp;your nasty clip will be shared with public straight away.<br />&gt; There&#8217;s no point in looking for me too &#8211; it won&#8217;t result in any success. Transactions with cryptocurrency are completely anonymous and untraceable.<br />&gt; There&#8217;s no point in reinstalling your OS on devices or trying to throw them away. That won&#8217;t solve the issue,<br />&nbsp;since all clips with you as main character are already uploaded on remote servers.</p>



<p>Things that may be concerning you:<br />&gt; That funds transfer won&#8217;t be delivered to me.<br />&nbsp;Breathe out, I can track down everything right away, so once funds transfer is finished,<br />&nbsp;I will know for sure, since I interminably track down all activities done by you (my Trojan virus controls all processes remotely, just as TeamViewer).<br />&gt; That your videos will be distributed, even though you have completed money transfer to my wallet.<br />Trust me, it is worthless for me to still bother you after money transfer is successful. Moreover, if that was ever part of my plan, I would do make it happen way earlier!</p>



<p>We are going to approach and deal with it in a clear manner!</p>



<p>In conclusion, I&#8217;d like to recommend one more thing&#8230; after this you need to make certain you don&#8217;t get involved in similar kind of unpleasant events anymore!<br />My recommendation &#8211; ensure all your passwords are replaced with new ones on a regular basis.</p>
</blockquote>
<p>The post <a href="https://cybersecurityplus.co.uk/how-to-spot-scams-like-i-regret-to-inform-you-about-some-sad-news-for-you-scam/">How to spot scams like I Regret To Inform You About Some Sad News For You scam</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Mac Is Not Virus Proof. It Never Has Been.</title>
		<link>https://cybersecurityplus.co.uk/your-mac-is-not-virus-proof-it-never-has-been/</link>
		
		<dc:creator><![CDATA[tonibennett]]></dc:creator>
		<pubDate>Thu, 15 Feb 2024 07:02:19 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cybersecurityplus.co.uk/?p=2185</guid>

					<description><![CDATA[<p>Apple computer owners have long felt free to roam the internet without a care in the world. You float out of the Apple Store with a white box that perfectly slides apart when you open it at your home, and inside is your impenetrable, space-grey fortress of solitude with an Apple logo just waiting to </p>
<p>The post <a href="https://cybersecurityplus.co.uk/your-mac-is-not-virus-proof-it-never-has-been/">Your Mac Is Not Virus Proof. It Never Has Been.</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2185" class="elementor elementor-2185">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-6e8bf334 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6e8bf334" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6183214b" data-id="6183214b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-30507d26 elementor-widget elementor-widget-text-editor" data-id="30507d26" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									
<p>Apple computer owners have long felt free to roam the internet without a care in the world. You float out of the Apple Store with a white box that perfectly slides apart when you open it at your home, and inside is your impenetrable, space-grey fortress of solitude with an Apple logo just waiting to shine for you. Prevailing wisdom would have you believe that Apple’s Macs are completely immune from viruses. However, Macs absolutely can get viruses.</p>



<p>The myth that Macs don’t get viruses has been around for a long time. The company doesn’t outright reject the myth, because it fits with Apple’s clean, seamless, and secure user experience. Researchers discovered the first Apple firmware viruses in 2015. By 2020, malware threats on Macs increased by 400%. In 2021, over 29,000 Macs were hit with a mysterious malware strain. Apple users have seen a sharp rise in security vulnerabilities in the last decade, and many Mac users have their guard down.</p>



<h2 class="wp-block-heading" id="h26496"><a id=""></a>Origins of the Myth</h2>



<p>“Hello, I’m a Mac,” said actor Justin Long in a 2006 Apple advertisement. He stood next to a visibly sick man, claiming to be a PC.</p>



<p>“I have that virus that’s going around,” said the PC man. “You better stay back, this one’s a doozy.”</p>



<p>“That’s okay,” Long said. “I’ll be fine.”</p>
								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9b93ddf elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9b93ddf" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52e5fd7" data-id="52e5fd7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-db11f27 elementor-widget elementor-widget-video" data-id="db11f27" data-element_type="widget" data-e-type="widget" data-settings="{&quot;youtube_url&quot;:&quot;https:\/\/www.youtube.com\/watch?v=sdF5IsyOxU4&amp;t=31s&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}" data-widget_type="video.default">
				<div class="elementor-widget-container">
							<div class="elementor-wrapper elementor-open-inline">
			<div class="elementor-video"></div>		</div>
						</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-c54046d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="c54046d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-205667c" data-id="205667c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6d8004b elementor-widget elementor-widget-text-editor" data-id="6d8004b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p class="sc-77igqf-0 fnnahv">The commercial was the beginning of a six-year advertising campaign from Apple, where it claimed that PCs had 114,000 known viruses, while Apple had none. Apple proudly boasted on its website that the Mac “doesn’t get PC viruses,” until 2012. That year, the company quietly removed these claims from its website, spotted by <a class="sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link" href="https://www.wired.com/2012/06/mac-viruses/" target="_blank" rel="noopener noreferrer" data-ga="[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https://www.wired.com/2012/06/mac-viruses/&quot;,{&quot;metric25&quot;:1}]]">Wired</a>, and replaced them with the wimpier claim that Macs are “built to be safe.”</p>
<p class="sc-77igqf-0 fnnahv">The claim Apple was making was true, and Apple computers did not commonly get viruses until the mid-2010s. However, the reason has less to do with Apple’s extraordinary malware protection, it’s more about the sheer number of Macs in the world.</p>
<p class="sc-77igqf-0 fnnahv">In 2013, <a class="sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link" href="https://www.statista.com/statistics/218089/global-market-share-of-windows-7/" target="_blank" rel="noopener noreferrer" data-ga="[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https://www.statista.com/statistics/218089/global-market-share-of-windows-7/&quot;,{&quot;metric25&quot;:1}]]">over 90% of the world’s computers were PCs running on Windows</a>, while just 8% of the world used Macs. There were likely even fewer Macs in 2006 when the “Get a Mac” ads started. Spreading computer viruses is largely a numbers game, so it makes sense to design viruses for the largest market out there, PCs. Even today, only 20% of the world uses a Mac.</p>
<p class="sc-77igqf-0 fnnahv">Today, it’s becoming more common for Macs to get viruses. The company’s large user base is now worth hackers going after them. Yes, Apple does have security protections in place, but it’s not like PCs don’t as well.</p>
<p class="sc-77igqf-0 fnnahv">So it was really Apple who started this myth with its own clever marketing. It’s like a small car company saying its cars crash less than Ford. It has nothing to do with safety, and everything to do with the number of products on the market.</p>
<h2 id="h26497" class="sc-1bwb26k-1 dezcon">Why It’s Pervasive</h2>
<p class="sc-77igqf-0 fnnahv">The idea that Apple’s computers are “virus-proof” feels like it should be true. Apple has built one of the strongest brands on Earth around reliable products, sleek designs, and clean marketing. “Virus-free” fits the vibe, but it’s simply not the case.</p>
<p class="sc-77igqf-0 fnnahv">When Apple’s Macs did start getting viruses, the company did little to correct the narrative it had created. Instead, Apple let this myth run amuck. In its defense, how do you let the world know, “Actually, your computer can get viruses now” without a PR disaster? The company was a little over its head, so it just stayed quiet.</p>
<p class="sc-77igqf-0 fnnahv">All of Apple’s products are susceptible to hackers and viruses, just like any other connected device. iPhones were the target of a vicious malware attack in Sept. 2023, prompting Apple to ask users to update their software immediately.</p>
<p>.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cybersecurityplus.co.uk/your-mac-is-not-virus-proof-it-never-has-been/">Your Mac Is Not Virus Proof. It Never Has Been.</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackers Can Now Bypass Two-Factor Authentication With a New Kind of Phishing Scam</title>
		<link>https://cybersecurityplus.co.uk/hackers-can-now-bypass-two-factor-authentication-with-a-new-kind-of-phishing-scam/</link>
		
		<dc:creator><![CDATA[tonibennett]]></dc:creator>
		<pubDate>Sat, 24 Jun 2023 05:51:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cybersecurityplus.co.uk/?p=2163</guid>

					<description><![CDATA[<p>Two-factor authentication, the added security step that requires people enter a code sent to their phone or email, has traditionally worked to keep usernames and passwords safe from&#160;phishing attacks. However, security experts have demonstrated an automated phishing attack that can cut through that added layer of security—also called 2FA—potentially tricking unsuspecting users into sharing their </p>
<p>The post <a href="https://cybersecurityplus.co.uk/hackers-can-now-bypass-two-factor-authentication-with-a-new-kind-of-phishing-scam/">Hackers Can Now Bypass Two-Factor Authentication With a New Kind of Phishing Scam</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></description>
										<content:encoded><![CDATA[




<figure class="wp-block-image"><img decoding="async" src="https://s.yimg.com/ny/api/res/1.2/iUVhoVlmYYDALirdb2.owA--/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTcyMDtjZj13ZWJw/https://media.zenfs.com/en/fortune_175/a35e0b15ebab435b52418001d59257b0" alt=""/><figcaption class="wp-element-caption">Hackers Can Now Bypass Two-Factor Authentication With a New Kind of Phishing Scam</figcaption></figure>



<p>Two-factor authentication, the added security step that requires people enter a code sent to their phone or email, has traditionally worked to keep usernames and passwords safe from&nbsp;<a href="http://fortune.com/2019/02/20/phishing-ransomware-formjacking-hack-hackers/" rel="noreferrer noopener" target="_blank">phishing attacks</a>.</p>



<p>However, security experts have demonstrated an automated phishing attack that can cut through that added layer of security—also called 2FA—potentially tricking unsuspecting users into sharing their private credentials.</p>



<p>The attack was first demonstrated at the Hack in the Box Security Conference in Amsterdam last month. A&nbsp;<a href="https://www.youtube.com/watch?v=glzq5yL8LCE" target="_blank" rel="noreferrer noopener">video of the presentation was posted on YouTube</a>&nbsp;on June 2, bringing renewed attention to how hackers are getting better at penetrating extra layers of security, despite people using stronger tools, like 2FA.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="#HITB2019AMS D2T1 - Muraena: The Unexpected Phish - Michele Orru and Giuseppe Trotta" width="640" height="360" src="https://www.youtube.com/embed/glzq5yL8LCE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>The hack employs two tools, called Muraena and NecroBrowser, which work in tandem to automate the attacks. The two tools work together like the perfect crime duo. Think of Muraena as the clever bank robber, and NecroBrowser as the getaway driver.</p>



<p>Muraena intercepts traffic between the user and the target website, acting as a proxy between the victim and a legitimate website. Once Muraena has the victim on a phony site that looks like a real login page, users will be asked to enter their login credentials, and 2FA code, as usual. Once the Muraena authenticates the session’s cookie, it is then passed along to NecroBrowser, which can create windows to keep track of the private accounts of tens of thousands of victims.</p>



<p>A demonstration of the attack was also released on GitHub, an open source coding site, to provide developers an opportunity to see how it works.</p>



<p>Amit Sethi, senior principal consultant at Synopsys, who was not affiliated with the presentation, says that while attacks against 2FA have been demonstrated in the past, these tools “make one of these attacks easier to execute for lower-skilled attackers.”</p>



<p>Despite this hack, 2FA is still considered a best security practice—far better than the alternative of simply relying on a username and strong password, according to security experts.</p>



<p>“Of course this does not mean that people should not worry,” says Sethi. “We now need to be even more diligent about detecting phishing attempts.”</p>



<p>The researchers, and Sethi, both say that universal second factor is a strong solution, when available. A U2F key is a secondary, physical device that can be plugged into a computer port as an additional way of verifying a person’s identity after they enter their username or password.</p>



<p>If that’s not an option, Sethi also says being vigilant can help thwart potential 2FA phishing attacks. That includes not clicking on links in suspicious emails, checking the a web address in the browser before entering credentials, and avoiding entering sensitive information when using public Wi-Fi.</p>



<p>“If you suspect that your credentials for a website have been compromised, act quickly to change your password, and report the event to the website</p>
<p>The post <a href="https://cybersecurityplus.co.uk/hackers-can-now-bypass-two-factor-authentication-with-a-new-kind-of-phishing-scam/">Hackers Can Now Bypass Two-Factor Authentication With a New Kind of Phishing Scam</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why You Should Setup Parental Control On Your Home Network</title>
		<link>https://cybersecurityplus.co.uk/why-you-should-setup-parental-control-on-your-home-network/</link>
		
		<dc:creator><![CDATA[tonibennett]]></dc:creator>
		<pubDate>Thu, 15 Jun 2023 09:26:31 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://cybersecurityplus.co.uk/?p=2117</guid>

					<description><![CDATA[<p>Your home WiFi network is only as safe as you make it. But that can feel like a lot of work.   In this article we are focusing on why parental controls should be included in your home network security setup.</p>
<p>The post <a href="https://cybersecurityplus.co.uk/why-you-should-setup-parental-control-on-your-home-network/">Why You Should Setup Parental Control On Your Home Network</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Your home WiFi network is only as safe as you make it. But that can feel like a lot of work.&nbsp; &nbsp;In this article we are focusing on why parental controls should be included in your home network security setup.</p>



<p>As a parent, you have young ones to monitor at all times – not to mention the rest of the household. Being full-time manager of your child’s online activity can feel like a big chore. But we all know that it is necessary.</p>



<p>While we know that it is necessary, did you know that parental controls can go beyond a few websites or Netflix accounts? You can set up parental controls on your entire WiFi network (and you need to).</p>



<p>Here’s why:</p>



<h2 class="wp-block-heading">Why you need parental controls on your home WiFi network</h2>



<p>There are three key reasons to set up parental controls on your home WiFi network:</p>



<ol class="wp-block-list">
<li>Controlling devices and content access</li>



<li>Setting time limits on daily Internet usage</li>



<li>Customisation for your home network</li>
</ol>



<p>Setting up parental controls on your home WiFi helps you monitor your child’s (and their friends’) online content access as well as device usage. With parental controls set on your entire WiFi network, you control everything.</p>



<p>Overall, these settings let you know exactly what everyone is doing on your network and when (because you customized it!).</p>



<p>Here’s how to set them up:</p>



<h2 class="wp-block-heading">How to set up parental controls on your home WiFi network</h2>



<p>Setting up parental controls for your WiFi network is easier than you might think. Often you can just log into your account and configure your router with the parental control settings.</p>



<p>Since your router is the centre of your entire network, you can filter the web for any or all devices that are connected through it. This means you can control your child’s computer, smartphone, tablet, gaming console, you name it.</p>



<p>If your router does not have these settings by default, consider investing in a newer model that does. This will make WiFi security much easier on your part.</p>
<p>The post <a href="https://cybersecurityplus.co.uk/why-you-should-setup-parental-control-on-your-home-network/">Why You Should Setup Parental Control On Your Home Network</a> appeared first on <a href="https://cybersecurityplus.co.uk">Cyber Security Plus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
