Posted on

Major Data Breach: Hackers Steal Phone Records of Nearly All AT&T Wireless Customers

external content.duckduckgo 43

the staff of the Ridgewood blog

Ridgewood NJ, In a significant cyberattack, hackers have stolen phone records from nearly all of AT&T’s 110 million wireless customers, the company confirmed on Friday. This breach adds to a growing list of cyberattacks targeting businesses and government agencies.

Continue reading Major Data Breach: Hackers Steal Phone Records of Nearly All AT&T Wireless Customers

Posted on

Hacker Breach Exposes OpenAI’s Internal Messaging Systems, Design Details Stolen

open ai 3315154187

the staff of the Ridgewood blog

Ridgewood NJ, last year, a hacker successfully breached the internal messaging systems of OpenAI, the renowned AI research company behind ChatGPT, and stole confidential details about the design of their artificial intelligence technologies, according to a report by The New York Times.

Continue reading Hacker Breach Exposes OpenAI’s Internal Messaging Systems, Design Details Stolen

Posted on

How to Safeguard Your Online Identity: A Guide

scott webb yekGLpc3vro unsplash scaled

Identity theft has never been more of a threat than it is today. With more people using the internet than ever before, it’s not hard to see why this is. Stealing somebody’s identity and using their personal information to take out loans and credit cards can be very lucrative for criminals. If you are a regular internet user, you need to do everything you can to safeguard your identity. This post will explore this topic in more detail, telling you how you can keep yourself safe, protect your identity from theft, and avoid digital fraud.

Continue reading How to Safeguard Your Online Identity: A Guide

Posted on

FBI Director Warns on Chinese Cyber Security Threat

FBI director Christopher Wray 857372640

the staff of the Ridgewood blog

Ridgewood NJ, FBI Director Christopher Wray issued a stark warning on Thursday, revealing that Chinese government-affiliated hackers have infiltrated critical infrastructure in the United States and are poised to strike at a moment’s notice. Speaking at Vanderbilt University’s 2024 Summit on Modern Conflict and Emerging Threats, Wray detailed an ongoing Chinese hacking campaign dubbed Volt Typhoon, which has successfully breached numerous American companies operating in telecommunications, energy, water, and other vital sectors. Alarmingly, 23 pipeline operators have been among the targets.

Continue reading FBI Director Warns on Chinese Cyber Security Threat

Posted on

SEC “X” Account Hacked Briefly Before Bitcoin EFT Approval

1382460371000 64458CS006 SEC UNDER FIR1

the staff of the Ridgewood blog

Ridgewood NJ, The U.S. Securities and Exchange Commission (SEC) confirmed that its X account, responsible for deciding on the approval of bitcoin ETFs, experienced a compromise, as reported to CoinDesk by Nikhilesh De and Krisztian Sandor. The SEC clarified that it had not granted approval for bitcoin ETF applications, contradicting a brief statement posted on its compromised X (formerly Twitter) account.

Continue reading SEC “X” Account Hacked Briefly Before Bitcoin EFT Approval

Posted on

Protecting Your Business: Essential Cybersecurity Measures for Small Businesses

external content.duckduckgo 15 scaled

In today’s digital age, the increasing reliance on technology in the business world is undeniable. However, this comes with its own set of risks, particularly in the realm of cybersecurity. Small businesses, with their often limited resources, are especially vulnerable. This article will guide you through essential cybersecurity measures that every small business should consider to protect their operations and reputation.

Continue reading Protecting Your Business: Essential Cybersecurity Measures for Small Businesses

Posted on

How Does A Virtual Private Network (VPN) Work? A Complete Explication

vpn g48d544c15 1920

A VPN is an ever-evolving network technology that hides your identity, location, and data on the web — protecting your security as you surf. But just what is a VPN? How does it work? And why do so many people use them today? This comprehensive blog post will explain everything about them.

Continue reading How Does A Virtual Private Network (VPN) Work? A Complete Explication

Posted on

NortonLifeLock Suffers Data Breach

external content.duckduckgo 49
the staff of the Ridgewood blog
Ridgewood NJ, Reusing passwords for multiple accounts can lead to password compromise, unauthorized account access, cyberattacks, and data breaches. Gen Digital, formerly Symantec Corporation and NortonLifeLock, notified customers of breached Norton Password Manager accounts in credential stuffing attacks as a result of compromised accounts on other platforms. NortonLifeLock believed an unauthorized third party acquired username and password combinations from the dark web around December 1 and utilized them in bulk to gain access to Norton accounts, which was detected after an unusually large number of failed login attempts on December 12. The credential stuffing attacks compromised thousands of accounts with potential access to first names, last names, phone numbers, mailing addresses, and possibly data stored in private vaults. This information could be used to compromise other accounts, steal digital assets, reveal secrets, and more. NortonLifeLock reset passwords for impacted accounts, advised enabling MFA, and offered a credit monitoring service. Impacted users who suspect their personally identifiable information (PII) has been compromised should review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources.

Continue reading NortonLifeLock Suffers Data Breach

Posted on

Stopping Your “Smart TV” From Spying on you

T3ZXDLNTFZJN7KTR3U2EF6KOXE 2402051457

the staff of the Ridgewood blog

Ridgewood NJ, during the holiday season, many individuals will be gifted a connected or Internet of Things (IoT) device – such as a smart TV, camera, home security system, gaming system, smartphone, tablet, or one of many household items that have become internet-capable in the last several years, such as doorbells, thermostats, coffee pots, refrigerators, toaster ovens, and even meat thermometers. Many of these devices lend a level of convenience to users by making controls available on the go via a smartphone app or website. While convenient, connected devices also transmit and store data and could be exploited by cyber threat actors to compromise networks, devices, or accounts. Compromised connected devices, combined with vulnerable home routers, increase the risk of cybercriminal activity and cyberattacks. Additionally, devices routinely connected to a home network can have further implications when subsequently connected to corporate networks and may introduce additional vulnerabilities and risks. Therefore, it is vital for users to employ cybersecurity best practices for the new gadgets they receive this holiday season and ensure devices and networks currently in use are properly secured.

Continue reading Stopping Your “Smart TV” From Spying on you

Posted on

’TIS THE SEASON TO BE WARY: NEARLY 2,000 AMERICANS ARE HACKED EVERY MINUTE

external content.duckduckgo 49

the staff of the Ridgewood blog

Ridgewood NJ, Cyber criminals are launching a relentless tide of attacks on US internet users — hacking 1,966 Americans every minute, virtual private network provider NordVPN can reveal1.

With the festive season offering cyber criminals a host of opportunities to cash in, the average US adult suffers a cyber attack of some kind four times a year, Nord’s latest research shows.

Continue reading ’TIS THE SEASON TO BE WARY: NEARLY 2,000 AMERICANS ARE HACKED EVERY MINUTE

Posted on

NJOHSP : Exercise Caution During Job Search

external content.duckduckgo 1

the staff of the Ridgewood blog

Ridgewood NJ, according NJ OFFICE OF HOMELAND SECURITY AND PREPAREDNESS ,  Job seekers are urged to exercise caution during their job search, as they could be targeted with fraudulent offers via phishing emails, social media, or SMS text messaging, according to NJCCIC. Threat actors entice their victims with promises of opportunities that are “too good to be true” to deliver malware, steal funds or collect personally identifiable information. These schemes may cost victims thousands of dollars and negatively impact their credit scores, according to the FBI. Job seekers are encouraged to research potential employers before providing sensitive information to unknown senders. The NJCCIC also recommends reviewing its Identity Theft and Compromised PII product for additional guidance.

Posted on

English Teenager Mastermind of International Hacking Group

external content.duckduckgo 43

the staff of the Ridgewood blog

Ridgewood NJ, Cybersecurity researchers investigating the recent Lapsus$ attacks have identified seven accounts associated with the hacking group. A 16-year-old living with his mother in England is believed to be the mastermind of the group. Rival hackers had posted his details online. The attacks were believed to be motivated in part by the desire for notoriety as the group didn’t try to cover its tracks and made public announcements.

Continue reading English Teenager Mastermind of International Hacking Group

Posted on

The 20 Passwords Most Commonly Used

external content.duckduckgo 49

the staff of the Ridgewood blog

Ridgewood NJ, according to a new report from mobile security firm Lookout, which recently published a list of the 20 passwords most commonly found in leaked account information on the dark web. The list ranges from simple number and letter sequences like “123456” and “Qwerty” to easily typed phrases like “Iloveyou.”

Continue reading The 20 Passwords Most Commonly Used

Posted on

Be Safe Online Shopping this Holiday Season

external content.duckduckgo 15 scaled

the staff of the Ridgewood blog

Ridgewood NJ, according to the New Jersey Cybersecurity and Communications Integration Cell , Cyber Monday 2020 set a record for e-commerce spending in one day, totaling $10.8 billion. With the pandemic raging on, many customers took to online stores to do their holiday shopping. While NJ COVID-19 cases have declined in recent weeks and vaccinations continue, we can still expect many customers to choose to conduct their shopping online and potentially start shopping earlier than usual given concerns for supply chain issues and shipping delays. Adobe predicts that online shopping spending will total over $200 billion for the first time ever by the end of the holiday season. Given the volume of e-commerce shopping, cybercriminals will continue their efforts to target online shoppers and marketplaces for financial gain. Therefore, it is vital to maintain awareness of the many cyber threats posed by these individuals and groups. Threat actors may target victims through a variety of methods, including compromised or spoofed websites, phishing emails, social media ads and messages, or unsecured Wi-Fi networks. Reviewing the following list of common attack vectors, along with tips and best practices, will help to combat the threats posed by cybercriminals this holiday season.

Continue reading Be Safe Online Shopping this Holiday Season