Steven Andiloro is the owner of Professional Security Solutions, a security company in North Carolina servicing customers nationwide!

Tag: Cyber Security

Steven-Andiloro---Greatest-Cyber-Threats-in-2018-compressor

Greatest Cyber Threats in 2018

It’s a new year, full of optimism and potential. If all goes right, 2018 can prove to be a great year for the world. But this year also has tremendous potential to be incredibly dangerous.

 

For those that do not know, 2017 was a landmark year for cybersecurity. The rise of ransomware reached its zenith with the NotPetya and WannaCry worldwide cyber attacks bringing several businesses and governments to a screeching halt; and data breaches became something of the norm, with major corporations, such as Equifax, HBO and Uber, admitting sensitive information was breached. Billions of people around the world were affected in one way or another by 2017’s cyber attacks alone. There’s no reason to believe that this year won’t be any different; in fact, it may be even worse.

 

So what are some threats that we should be aware of this year?

 

The Number of Cyber Criminals Will Rise

With how frequent these cyber attacks have become, it stands to reason that they’ve gained a bit of attention. Multiple high-profile news outlets have reported on the attacks and even claimed that hacking is a billion-dollar industry. Naturally, this makes the “hacking industry” seem too attractive to not partake.

 

It has also become easier than ever to become a hacker. In order to become a hacker in the past, you needed a computer and an in-depth knowledge of programming and coding; today, you simply need a basic understanding of how technology works and a computer (which are far more abundant and common). Expect the number of hackers to rise in 2018.

 

Attacks on Vulnerable Systems

Cybercriminals will continue their malignant campaigns against the systems that are too weak or underfunded to defend themselves. Naturally, this means healthcare and schools. Both schools and healthcare systems have vast amounts of sensitive, private information that can easily get into the hands of criminals, especially considering how popular IoT devices have become.

 

Security Software Must Be Ready

You may be thinking, “I have Internet security software on my computer and phone, I’m perfectly safe.” Well, that may not be the case. Industry professionals also predict that the new year will bring a new focus on security software. Essentially, hackers will be delving into the code of security software and attempting to find holes and weaknesses.

 

While we must enter every year with a slight sense of hope, we must also be prepared for any and all dangers. Cyber security is no longer a possibility; it is a reality. And it is one that we must prepare for.

Steven-Andiloro-Ring-compressor (1)

Even More Personal Safety Devices

With all of the technological attacks and threats that have plagued our world in the last few years, it is very easy to forget about protecting yourself in other ways. Personal security is just as important as online security. You must remain vigilant at all times and protect yourselves. Luckily, today’s technologically-driven world has allowed for some fascinating advancements in personal security, as well as online security. Here are a few personal security gadgets and devices that you should look into.

 

Door Stop Alarm

If you’re looking to prevent home burglaries, then look no further than the door stop alarm. An incredibly simple device, the door stop alarm is shaped like a traditional door stop, and features an alarm that will sound if a door is opened. No matter how silently a thief opens a door, they cannot prevent the alarm from going off. It’s a great way to protect your home.

 

Wearable Alarms

When you’re being stalked or even chased by an assailant, reaching for your cell phone and making a call may be next to impossible. That is precisely why wearable alarms have become very popular in recent years. Personal security devices, like the Nimb Ring or the WearSafe are designed for situations like these. Although all of these devices have their own exclusive features and variations, the idea is still the same: a wearable device that connects to your smartphone through an application and can send an alert signal to authorities and personal contacts when pressed. These alarms can be literal lifesavers.

 

Video Doorbell

If you’re home alone and you get a ring at your door, you want to know who it is, right? But what if you weren’t expecting any company or it is very late at night? Who is at your door? Well, with a video doorbell, you can find out in just a few taps. Video doorbells connect to your home wifi and allow you to see who is standing at your door in real-time through a mobile application. You can even communicate with your visitor. It’s an incredibly safe way to answer your door.

 

Make sure to stay safe out there!

Steven Andiloro Bitcoin

How Can Bitcoin Help in Ransomware Attacks?

Unless you’ve been living under a rock in the last few months, you’ve heard of Bitcoin. It’s the latest craze sweeping the nation. Many people want to learn about the mysterious virtual currency and see if it can reap major fiduciary rewards. However, it is now being used for a completely different purpose.

 

Before I go any further, it might help to know what Bitcoin is. In short, Bitcoin is a form of cryptocurrency that is monitored on a peer-to-peer basis. It is not centralized by a governing bank or group and it is completely virtual. It gets a bit more technical and complicated when you really dive into it, but, for the purposes of this article, that’s all you really need to know.

 

So how can Bitcoin help in the fight against ransomware attacks? Well, quite simply, it can be used to pay off those ridiculous ransoms. For those unaware of how ransomware works, it is very simple; a computer that is infected with a ransomware virus is held “hostage” and its information is held for ransom. When the owner of the computer pays the ransom, then he or she gets access to the computer again and can access their information. That is the most broad definition of ransomware.

 

Because of the growing popularity of ransomware in recent years, some companies are considering to stock up on Bitcoin in order to pay off these large ransoms and continue with their business. When an entire network of computers are locked up and held ransom, it can be a headache to fix the system and bypass the virus. So, some companies are looking into simply using Bitcoin to avoid the hassle and pay the hackers.

 

Several British companies are utilizing this tactic. Because ransomware attacks are so commonplace, several British companies are informing employees to maintain a Bitcoin wallet in case of an emergency. Unfortunately, paying hackers can only provide a temporary solution. In fact, in most cases, even if a ransom is paid, the information isn’t guaranteed to be returned. But most companies prefer to stay quiet about online attacks.

 

Can Bitcoin be the ultimate solution to stopping ransomware hackers? Or will paying them off with digital currency be the same as feeding a stray cat? Only time will tell, but my guess is the latter.

Steven Andiloro Even more of the Worst Online Attacks in History

Even more of the Worst Online Attacks in History

I’ve previously discussed several of the world’s most notorious online hacks. I figured I would continue this series and take you down memory lane with two more of the worst online attacks in history.

 

Jonathan James

This is quite possibly one of the most unique and tragic hacks in the history of cyber crime. In 1999, a young hacker by the name of Jonathan James committed one of the most stunning cybercrimes to that point in time: he was able to hack into the computers of both NASA and the US Department of Defense. At only 15 years old, Jonathan was able to install a backdoor into the US Department of Defense’s servers which gave Jonathan access to over three thousand private messages, which included usernames and passwords. Jonathan also installed a backdoor into NASA’s servers which granted him access to a portion of the aeronautics organization’s software. The attack cost NASA $41,000 to repair. Once caught, Jonathan was sentenced to house arrest and probation, and was required to write letters of apology to both NASA and the Department of Defense. Unfortunately, Jonathan was suspected of being involved in another series of online hacks in 2004, and took his own life in 2008.

 

The TJX Attacks

Going off of Jonathan’s story, the attack that he was suspected of being a part of turned out to be quite a large attack. Jonathan was suspected of being a part of a group of hackers named the “Shadowcrew.” The crew, led by Albert Gonzalez, managed to steal over 45 million credit and debit card numbers from shoppers of the TJX company, which owns the TJ Maxx and Marshalls retail stores. Gonzalez, the mastermind behind the operation, supposedly took on an expensive lifestyle and spent millions of dollars. And this wasn’t Gonzalez’s only series of attacks. He also led attacks on Dave & Busters and Heartland Payment. Gonzalez was put on trial in 2010 for his TJX hacks and was sentenced to 20 years in prison. He was incredibly remorseful for his actions, and hopefully, once he is released he will be a changed man.

 

Cybercrime has been going on for years, and it shows no signs of stopping. Hopefully we can learn from history and, as a society, boost our respective network security systems and prevent situations like this from ever happening.

 

Be sure to check back in for even more of the worst online hacks in history!

Steven Andiloro Beginners Guide To Internet Security

Beginners Guide To Internet Security

The creation of the internet has led to many great technological advances in our lifetimes. Everything from research capabilities to video chatting with people around the world is feasible thanks to the world of being able to log online. Sadly, many people have dedicated their lives to creating viruses and cyber attack mechanisms to destroy and alter the way we use the internet. It is important for everyone to be aware of viruses that exist and best practices for keeping your digital footprint safe.

 

Preventative Measures

Before the hackers and viruses can make their way onto your devices, there are plenty of proactive methods for keeping your information secured. One of the best practices includes making sure a strong password is used for all properties. Many sites now have strength requirements (upper and lower case letters, numbers, special characters, etc.) but for those that have no requirements, it is still best practice to include as many features in a password as possible. Another tip, though tedious, is creating a different username and password for all login credentials. People who use the same passwords for all accounts are more likely to be hacked via multiple sites rather than just one. A great tool to utilize are apps such as Keeper, which creates a secure location to manage all of your passwords in case they are forgotten.

 

One of the largest sources of cyber attacks stems from improper use of certain online properties. McAfee shares that improper use of tools such as email and instant messaging can cause holes in your security walls, allowing viruses to be easily implanted in your system. Additionally when online shopping, make sure that there is a note on the checkout page, ensuring that the site and your information is safely protected from hackers.

 

Services

In addition to completing the above actions, there are many companies that provide online security for you and your devices.Top Company Compare ranks a few of the top contenders with brands such as Norton, Scanguard, and Total AV making the top 5 list. By purchasing one of these software systems, you are eliminating any additional risk factors that come along with intense online use. These products usually update automatically and are applicable to multiple devices, giving optimal coverage for any possible online invasions.

With the number of daily technological advances being made, there is always room for cyber attackers to grow their craft. Even those who sparingly use the internet, knowledge, and protection from any sort of breach or hack that may present itself is crucial. Continuously remaining aware of our internet practices will provide less of an opportunity for cyber disasters.

Powered by WordPress & Theme by Anders Norén