Fortinet, the global leader in high-performance cyber security solutions, warns businesses and individuals in Philippines to brace for escalating cyber-attacks as cyber-criminals expand their targets to home network devices and mobile devices. Fortinet’s latest Global Threat Landscape Report for Q2 2017 revealed that 90% of organizations recorded attacks targeting system and device vulnerabilities that were at least 3 years old, even though updates and patches that corrected those vulnerabilities had long been available. Even more alarming, about 60% of organizations reported successful attacks that had targeted vulnerabilities that were 10 or more years old. A growing percentage of such attacks also target home network devices, such as routers and wireless access points. And 1 in 20 of such attacks today target mobile devices, such as Android-based smart phones and tablets.

 

Cyber attackers target a wide range of known vulnerabilities in these devices – known collectively as the Internet of Things or IoT – in order to control them remotely, collect users’ data, or install malicious code that allows attackers to aggregate millions of similarly compromised devices into huge cyber weapons known as botnets that can be used to generate huge volumes of data traffic that can overwhelm and shut down targeted online organizations or cripple Internet traffic.

 

“We are now living in a digital world, and cybercrime is part of that new reality,” said Anthony Giandomenico, senior security strategist/researcher, Fortinet. “We have all learned to lock our cars, deadbolt our doors, look both ways before crossing the street, and avoid dark alleyways and streets at night. It is time to develop the same good habits as we navigate through our digital environment.”

 

Fortinet offers the following cyber-safety tips to mitigate the risks of cyber-attacks:

1. Control Your Social Media.

Be careful who you “friend” on your application. Cybercriminals often set up fake pages or accounts and request to be added as a friend. Look out for the following to identify fake requests from criminals hoping to steal data or trick you into clicking on links to infected sites:

 

  • Always look at the home page of the person making the request. When was it set up? What year do they claim to have graduated from college or started their new job? Can you see photos of normal activity or does their page seem to mostly be glamour photos? If you don’t know the person making the request, or anything on their site seems odd, simply dismiss their request.
  • If the person making the request is someone you know, check to see if he or she is already a friend of yours. Look at their vital information. Do the dates seem correct? If you still have doubts, contact them directly to see if they have built a new page. If not, their account has been hijacked or duplicated.

2. Scrutinize Your Online Transactions.

Your bank will never initiate a request to verify your account or provide your login credentials. Such requests, either online or via email, can safely be ignored or deleted. Should one receive an email or a browser page with a link attached, always look at the URL before you click it. Hover over the link and look at the address that shows up. It should start with a real address, such as “www.(yourbank).com”. The address should also be reasonably short. To remove any doubts, simply log into the site directly rather than use the link provided, or call your financial institution to ensure that the request is legitimate.

3. Inspect Your Email.

The most common way to get users to load malicious software or malware onto their systems is through an email attachment. Known as phishing, these attacks often claim that the file attached to your email is a receipt or bill for a fictitious transaction, a fake document that needs immediate attention, or a message from a friend or family member. NEVER click on an attachment or web link in an email from someone you do not know, that you did not request, or that does not seem entirely legitimate.

 

A quick way to check the validity of an email is to simply look at the email address of the sender (you can do that by double clicking on the name of the sender or by hitting reply.) Does the email match the organization? Is it especially long, from a different organization or location from what you expected, or does it include strings of letters or numbers? If so, you can safely delete it.

4. Update Your Devices.

Review devices in your home that are connected to the Internet. These should include phones, DVRs, TVs, security cameras and other online devices, and even home routers and wireless access points. Write down the names of the manufacturers and the model numbers, and list all the software running on these systems. Once you have a complete inventory list, search for known vulnerabilities or patches, and make sure that these devices and applications are running the latest patches and the most current versions of their operating systems, firmware, or software. If a device or application is no longer supported by the manufacturer, the safest thing to do is to replace it.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Everyone is just a call away with TNT SurfSaya 30 BONUS unlimited all-net calls
Techworld Date Posted: 28 August 2019 9:50 AM | 730 Views
Everyone is just a call away with TNT SurfSaya 30 BONUS unlimited all-net calls. See More
 
Everyone is just a call away with TNT SurfSaya 30 BONUS unlimited all-net calls
Techworld Date Posted: 9:50 AM | 730 Views
Everyone is just a call away with TNT SurfSaya 30 BONUS unlimited all-net callsSee More

 
Special Delivery: Cybercriminals Use Pirated Software to Secretly Infect PCs for Cryptocurrency Mining
Techworld Date Posted: 3 January 2018 2:23 PM | 568 Views
Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’. See More
 
Special Delivery: Cybercriminals Use Pirated Software to Secretly Infect PCs for Cryptocurrency Mining
Techworld Date Posted: 2:23 PM | 568 Views
Kaspersky Lab researchers have identified a fraud scheme where mining software was distributed and secretly installed on users’See More

Rhea Sanvictores
ESGS 2017: The Summit of All Gaming
Techworld • By: Rhea Sanvictores | Date Posted: 30 October 2017 5:23 PM | 1217 Views
Hailed as the biggest gaming event in Southeast Asia, the recently concluded Electronic Sports and Gaming Summit (ESGS) has just proven that it really is. . See More
Rhea Sanvictores
ESGS 2017: The Summit of All Gaming
Techworld • By: Rhea Sanvictores | Date Posted: 5:23 PM | 1217 Views
Hailed as the biggest gaming event in Southeast Asia, the recently concluded Electronic Sports and Gaming Summit (ESGS) has just proven that it really is. See More

 
Connectivity Issues Lead to Damaged Relationships in 1-in-6 Cases
Techworld Date Posted: 21 September 2018 9:33 AM | 362 Views
Staying connected is now an obligatory part of showing you care. According to a study from Kaspersky Lab, connectivity is now a vital part of our duty to family, friends and loved ones. . See More
 
Connectivity Issues Lead to Damaged Relationships in 1-in-6 Cases
Techworld Date Posted: 9:33 AM | 362 Views
Staying connected is now an obligatory part of showing you care. According to a study from Kaspersky Lab, connectivity is now a vital part of our duty to family, friends and loved ones. See More

 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 29 August 2017 3:41 PM | 226 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released.... See More
 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 3:41 PM | 226 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released...See More

 
NMW2017: Kaspersky Lab and AVL Software and Functions GmbH Pave the Way for Secure-by-Design Connected Cars
Techworld Date Posted: 18 September 2017 9:27 AM | 466 Views
In response to the rising cybersecurity challenges facing the connected and autonomous car industry, Kaspersky Lab and AVL Software and Functions GmbH have unveiled the Secure Communication Unit (SCU) at New Mobility World /.... See More
 
NMW2017: Kaspersky Lab and AVL Software and Functions GmbH Pave the Way for Secure-by-Design Connected Cars
Techworld Date Posted: 9:27 AM | 466 Views
In response to the rising cybersecurity challenges facing the connected and autonomous car industry, Kaspersky Lab and AVL Software and Functions GmbH have unveiled the Secure Communication Unit (SCU) at New Mobility World /...See More

 
GoDigital Releases OKTO as an Enabler for SMEs to Digitize Quickly at Scale
Techworld Date Posted: 1 March 2019 5:18 PM | 252 Views
More Filipinos are shifting to cashless payments year by year. Studies such as the Visa Consumer Payment Attitude Study 2018 highlight the growing preference of Filipino consumers for new payment methods. See More
 
GoDigital Releases OKTO as an Enabler for SMEs to Digitize Quickly at Scale
Techworld Date Posted: 5:18 PM | 252 Views
More Filipinos are shifting to cashless payments year by year. Studies such as the Visa Consumer Payment Attitude Study 2018 highlight the growing preference of Filipino consumers for new payment methodsSee More

 
From Careless to Careful: Top Tips to Secure BYOD in the Workplace
Techworld Date Posted: 20 October 2018 9:06 AM | 329 Views
On the heels of the latest breaches against widely-used online platforms Facebook and Google that affected millions of users worldwide, Kaspersky Lab today puts the spotlight on the role of employees in keeping companies.... See More
 
From Careless to Careful: Top Tips to Secure BYOD in the Workplace
Techworld Date Posted: 9:06 AM | 329 Views
On the heels of the latest breaches against widely-used online platforms Facebook and Google that affected millions of users worldwide, Kaspersky Lab today puts the spotlight on the role of employees in keeping companies...See More

 
Mine a Million Kaspersky Lab Identifies Sophisticated Hacker Group Earning Millions through Mining Malware
Techworld Date Posted: 5 March 2018 4:48 PM | 492 Views
According to Kaspersky Lab researchers, cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software on attacked PCs within organizations.. See More
 
Mine a Million Kaspersky Lab Identifies Sophisticated Hacker Group Earning Millions through Mining Malware
Techworld Date Posted: 4:48 PM | 492 Views
According to Kaspersky Lab researchers, cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software on attacked PCs within organizations.See More

 
Kaspersky: Silence APT Group Expands Hacking Targets, Moving Activity Outside the CIS Region
Techworld Date Posted: 9 July 2019 4:45 PM | 174 Views
Kaspersky: Silence APT Group Expands Hacking Targets, Moving Activity Outside the CIS Region. See More
 
Kaspersky: Silence APT Group Expands Hacking Targets, Moving Activity Outside the CIS Region
Techworld Date Posted: 4:45 PM | 174 Views
Kaspersky: Silence APT Group Expands Hacking Targets, Moving Activity Outside the CIS RegionSee More


Power by

Download Free AZ | Free Wordpress Themes