Bluetooth-based skimmer

 

The device featured here is a Bluetooth-based skimmer;

it is designed to steal both the card data when a customer swipes and to record the victim’s PIN using a PIN pad overlay.

Learn more about it :https://krebsonsecurity.com/2017/02/more-on-bluetooth-ingenico-overlay-skimmers/

Sony got hacked again!!

Sony got hacked again
This larger companies have very sophisticated security systems in place. They are NOT easy to hack.

Therefore, if THEY are getting hacked, getting into small business’ network is not that challenging ... one in every five small business get hacked every year.

Creating a password? Don’t do these 4 things

Security researchers and IT consultants are quick to give people advice on how to create a strong password, and usually this comes in the form of a list of tips, strategies, and must haves. But recently, CyLab, an institution dedicated to cyber security research and education, decided to take another route.

5 of the most recent DATA BREACHES

In the last few months, the cyber world has been hit with one attack after the other after the other. And while this sounds completely horrible, it really isn’t anything out of the ordinary. At this point, we’re used to cyber-threats and data breaches, and when something large-scale does occur, there’s the predictable mad dash for everyone and anyone to change their passwords – which is a good thing.

Cyber Security Webinar

Business owners do you want to learn about What Scammers and Hacker Threats look like?
You dont want to miss our upcoming Cyber Security Webinar.

You can get the full details (and register)
here:

https://attendee.gotowebinar.com/register/7330290466086102275

I hope to see you there,

How do Hackers Hack?

We hear about hackers hacking all the time. But how do they really do this? What is the actual “hack” of the matter?
There are plenty of ways a hacker can get what they want from a company, a person, or an agency, but here are a few of the most popular methods of attack.