Skip to main content

Cyberattacks Are Getting More Creative, Here's What You Need to Know

 Charles Harry, an associate professor and director of the University of Maryland's Center for Governance of Technology and Systems, not to mention the former cyberwarfare expert for the NSA, has stated that cyberattacks are becoming a lot more complex. As a result of the fact that this is the case, they might come from places that you weren't expecting, which would make them a great deal more harmful than might have been the case otherwise.


According to Harry, these are the five least suspected places that a cyberattack could end up originating from:

LinkedIn

In the age of self promotion, LinkedIn has become a breeding ground for malicious actors that want to get you to click on some type of a link. They might pose as recruiters because of the fact that this is the sort of thing that could potentially end up making your more likely to fill out a form, but if you were to try to upload your resume, your system would get infected by malware.

Your favorite website

Browsing popular websites is a great way to pass the time, but you should steer clear of any tempting ads that you end up seeing while you’re there. With all of that having been said and now out of the way, it is important to note that clicking on these ads might make you fall prey to something called malvertising, so it’s best to avoid interacting with them.

Flash drives

It’s quite common to get handed a free flash drive at a convention of some sort. It bears mentioning that these drives can contain malware, which is why you should never use hardware that you got from an untrustworthy source.

Personal printers

Owning a printer can be useful, but on the off chance that you get a notification asking you to download an update, you should never ignore it. These notifications are sent by the company whenever there is a security threat, although you should make sure that the source is legitimate.

People you know

You’d never expect a loved one to scam you, which is exactly what makes deepfakes and voice cloning so dangerous. In a nutshell, a malicious actor might pose as someone you know to ask for money, or to get you to give up your account details or password.
University of Maryland professor cautions against cyber threats from seemingly harmless sources including personal printers and flash drives.

Image: Digital Information World - AIgen

Comments

Popular posts from this blog

Is Google Sunsetting Gmail In 2024? New Hoax Leaves Users Confused

  Rumors are going strong on social media about Google’s journey with Gmail coming to an end. And that too as early as this year. If you paid witness to such a shocking hoax that’s fast spreading online too then we can confirm that it’s not true by any means. The Android maker is addressing the need for users to calm down after the hoax emphasizing the company’s goodbye to Gmail. Many versions of this hoax can be found online  on the Twitter (X) app . But Google has rest assured everyone to take it easy and that it’s not going anywhere. However, a clause also mentions how users would now be defaulted to new views on Gmail. So other than those cases where you had specifically requested for the basic HTML version, nothing is going to change. The search engine giant  just made  updates to its respective  support page  too instead of this hoax and how it will now change to Standard display after the issuance of a deadline date. Reports by users on tech outlet...

Telegram is Home to Many Scammers and Cyber Criminals Who Sell Many Phishing Tools at Cheap Prices

  Telegram is a popular messaging app that has over one billion downloads and 700 million monthly users. However, this popular app is quite known for its selling and buying of phishing kits that scam users and sell their harmful wares. A cybersecurity startup, Guardio, published  a report  that sheds light on some phishing tools on Telegram. It was revealed that there are some harmful kits available on Telegram that can easily hack users’ social media and bank accounts logins. Guardia said that Telegram is a scammer’s heaven due to easy access and cheap prices of many phishing tools. There are also many phishing groups on Telegram where different scammers share data with other scammers and use phishing tools for hacking and phishing. For a few years, Telegram has become a home to many seasonal scammers and newcomers who sell malicious tools to steal the data of people. Some of the expensive phishing tools on Telegram also let the scammers create fake pages that easily byp...

200,000 Private Records From Facebook’s User Database Stolen, Hackers Forum Confirms

  A hacker has just raised the alarm amongst Facebook users after confirming that 200,000 personal data record entries were reportedly stolen from the firm’s database. The news is alarming for obvious reasons as the claims further went on to delineate how the cybercriminal dubbed ‘alogoatson breached contractors’ efforts that are in charge of Facebook’s cloud services. They stole part of the user database that featured a significant number of entries. The information was rolled out by a leading threat actor dubbed ‘IntelBroker’ which is notorious for a long list of leaks that entailed data stolen through General Electric and a long list of high-profile attacks taking place. This sample entails lists featuring full names, profile image links, and hashed passwords. Other than that, profile ratings, settings, and plenty of reviews were on display. The hacker explained how the data that was compromised included the likes of Physical IDs. This database was first rolled out in February a...