It’s a hacker’s economy these days. There are millions of dollars to be made from people reusing passwords, oversharing information online, or doing business with companies with poor cybersecurity management. So remember to practice good cybersecurity: do not reuse passwords, always confirm whom you are sharing sensitive information with, and track where your digital identity may be exposed on HackNotice Personal for free HERE.
Share this post with your friends as a reminder to why “1234” should not be their password
Heat Group managing director Gillian Franklin was in London last year when a text message from a staffer sent her world into a tail-spin… The $130 million wholesaling business had come to a screeching halt, placed behind lock and key after a hacker infiltrated its systems in a ransomware attack… Almost everything was captured, including 20 years of sales history, payroll and employment details, customer trading terms and archived creative work.
Hackers can strike at any moment and when they do, it can get costly. The best defense is going on the offense with actionable threat intelligence.
Think sensitive information about your business has landed into the hands of hackers? If you suspect your information has been part of a data leak, use HackNotice Instant Check for free and see if your data is being shared by hackers. Simply click HERE and enter the information you want checked.
With Fortnite’s immense popularity skyrocketing over the past few years – it currently has more than 350 million global players – the game is a lucrative target for cybercriminals. So lucrative, in fact, that 2 billion breached accounts have gone up for sale in underground forums so far in 2020 alone, according to a new report… After tallying the auction sales for several high-end and low-end Fortnite account sellers over a three month period, researchers found that on the high end, sellers averaged $25,000 per week in account sales — roughly $1.2 million per year.
Even though a large number of these accounts are owned by kids, the accounts are ultimately tied to parents’ credit cards.
According to the alert, the BeagleBoyz’s bank robberies pose:
Operational risks. According to CIA, the BeagleBoyz have attempted to steal nearly $2 billion since 2015 by rendering financial institutions’ systems inoperable.
Reputational risks. The alert states that “any BeagleBoyz robbery directed at one bank implicates many other financial services firms in both the theft and the flow of illicit funds back to North Korea.”
Not all hacks are for personal monetary gain. Funds can be used by people and nations alike.
Even if you’re cool with folks knowing your first name in theory, if someone can match that name to an email or phone number, then match those to a password that may have been leaked elsewhere in the past, you’re in trouble. Social Data’s compromised database is one of those unforeseeable instances of mishandled user data that can hand your info over to the wrong people. It’s ultimately up to users to keep themselves safe.
Cyber attacks are built like a puzzle with pieces that come together in singles or groups. So keep your pieces safe from criminals.
He was an early member of the Tesla “root access” community, a group of Tesla owners who would hack their own cars to get more control over them and even unlock unreleased features… At the time, Hughes was using his knowledge to tinker with salvaged Tesla vehicles and build off-grid energy storage systems and electric conversion kits.
A brand loyalist with skills that can help thwart a possible large scale disaster – this is the type customer every company wants.
That’s this week’s roundup, showing that every industry benefits when good cybersecurity habits are followed. So wash your hands and keep your passwords secure. Thanks for reading, stay safe and we’ll see you next week!
Exclusive offer for Weekly Roundup readers. Get 30% off your first 3 months of HackNotice Premium with coupon code: summer30. Enter that code in the Premium Upgrade page before it expires quick!