Skip to main content

Posts

Showing posts from September, 2019

How to Protect Your Online Store from Cyber Threats

Owning an online store can be a fabulous and lucrative venture in today’s marketplace. With so many sales and transactions taking place online, it can seem like the very best place for you to set up shop. But, while owning an online store can certainly lead to success, it also opens the door to cyber threats, something that is far too common today. Statistics show  that, by the year 2023, the United States will account for half of the breached data around the world, which is about 33 billion records. Not only that, but such things as malware are also on the rise, becoming more and more common. So, know these threats exist and are just waiting to target your online store. But, what can you as a business owner do to protect from cyber threats? Here are some tips you can implement.  Make Sure the E-Commerce Platform You Use is Trusted One of the first steps in ensuring your online store is secure is to ensure it resides on a trusted e-commerce platform. When yo...

Hackers can break into Android devices by sending a text

Not long ago, we saw the emergence of sim swapping attacks utilizing a loophole in the two-factor authentication process. Now in the latest, researchers from Check Point have discovered vulnerabilities in certain Android-based phones including the likes of Samsung, Huawei, Sony, and LG which allows attackers to access your information. These phone companies collectively happen to make up 50% of all Android phones according to  statistics from 2018 , therefore, chances are that every second Android user is now vulnerable to the attacks identified by Check Point. The technology exploited is called Over-the-Air provisioning (OTA) which has been used commonly by cellular networks to update network settings on a user’s phone. As it requires nothing more than a tap, its ease of use is behind its popularity as a method to do so. How it does this is through classical phishing. When the suggested settings message appears, one is naturally inclined to belie...