Digital Transformation of Businesses
88.0K views | +120 today
Follow
Digital Transformation of Businesses
A selection of documents, articles, papers, videos and other content for those interested in the transformation that is required when going 100% digital in an organization. I also try to highlight the impacts, both positives and negatives of that transformation. Like it? Please click "Recommend"
Curated by Farid Mheir
Your new post is loading...
Scooped by Farid Mheir
Scoop.it!

7 ways admins can help #secure accounts against #phishing in G Suite

7 ways admins can help #secure accounts against #phishing in G Suite | Digital Transformation of Businesses | Scoop.it

We work hard to help protect your company against phishing attacks—from using machine learning, to tailoring our detection algorithms, to building features to spot previously unseen attacks. While we block as many external attacks as we can, we continue to build and offer features designed to empower IT administrators to develop strong internal defenses against phishing. Here are seven things we recommend admins do in G Suite to better protect employee data.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

If you have a Google Suite (GSuite, Google apps) account, then you will want to implement all 7 recommendations in this article - especially #1.

more...
prgnewshawaii's curator insight, Today, 1:55 AM

Thanks to reporter Farid Mheir for this look at some of the security weaknesses of the G-Suite and what steps administrators can take to reduce phishing attacks via g-mail.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

4% to 10% of #web #encrypted #https traffic is intercepted

4% to 10% of #web #encrypted #https traffic is intercepted | Digital Transformation of Businesses | Scoop.it
Overall we found out that HTTPS interceptions are more prevalent than expected (4% - 10%) and pose serious security risks as they downgrade the encryption used to secure web communications. Furthermore, the HTTPS implementations used for interception do not have the same automatic update mechanisms that browsers do, making fixes less likely to be rolled out. Intercepting middleboxes have also contributed to the delayed release of TLS 1.3 in browsers. It is our hope that raising awareness around this issue will help software vendors that rely on interception to realize the risks of this practice.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is a technical article that sheds light onto a potential security risk that all digital professionals should be aware of as we generally assume that SSL and HTTPS will keep our conversations secure over the Internet.

more...
prgnewshawaii's curator insight, September 14, 5:48 PM

Thanks to reporter Farid Mheir for this cautionary tale about https.

While https adds another layer of security to our online transactions, it isn't foolproof--particularly when it comes to e-mail.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Equifax Breach Response Turns Dumpster Fire & stock crash — via @briankrebs

Equifax Breach Response Turns Dumpster Fire & stock crash — via @briankrebs | Digital Transformation of Businesses | Scoop.it

As noted in yesterday’s breaking story on this breach, the Web site that Equifax advertised as the place where concerned Americans could go to find out whether they were impacted by this breach — equifaxsecurity2017.com — is completely broken at best, and little more than a stalling tactic or sham at worst.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Equifax monopoly should end because there are so many ways to do the same work they do in more transparent and rapid fashion. Anyone that has had to request an equifax score or report can testify how long and tedious the process is. The way they have handled the breach is absolutely unprofessional and hopefully a sign that their time has come - as evidenced by this report from Krebs and the fact their stock is being crushed.

http://www.businessinsider.com/equifax-stock-price-options-traders-on-further-decline-after-security-breach-2017-9 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Your #heart can be #hacked: FDA recalls half-a-million pacemakers over hacking fears

Your #heart can be #hacked: FDA recalls half-a-million pacemakers over hacking fears | Digital Transformation of Businesses | Scoop.it

Turns out former Vice President (and erratic shooter) Dick Cheney was right all along: Your heart can be hacked. At least if you have a pacemaker, that is. On Tuesday, the FDA recalled 465,000 of the medical devices -- the ones that help control your heart beat -- citing security vulnerabilities. The pacemakers, which come from health company Abbott (formerly St. Jude Medical), require a firmware update. Fortunately, it can be installed by a health care provider in just three minutes.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Was just a question of time before it happened. Everything is connected and the trend is clear that nothing will escape the insertion of software into all kinds of devices. You have to know which ones are safe and which ones are not.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

#bitcoin mining is huge business - look at how profitable is Bitmain, a chinese R&D custom mining hardware

#bitcoin mining is huge business - look at how profitable is Bitmain, a chinese R&D custom mining hardware | Digital Transformation of Businesses | Scoop.it

Bitmain will probably make around $200M-$250M in profits this year just from their BM1387 chip (they have other products, including a Scrypt ASIC). Even after including ongoing R&D and other future investment, they are likely worth well over $1 Billion as a business and are probably the largest and most profitable company in Bitcoin.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

With bitcoin value at 4K$ USD, companies that specialize in dedicated hardware to mine bitcoins have become more profitable than ever. I find it interesting that this one, bitmain, which appear to be the leader, is Chinese. Morever, one should notice that mining bitcoin is very similar to cracking password or encryption, but it seems that these devices cannot be used for that purpose (https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication ) . however, the expertise can easily be refocussed on password cracking of encryption.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Never Post or Trash Your Airline Boarding Pass via @krebs

Never Post or Trash Your Airline Boarding Pass via @krebs | Digital Transformation of Businesses | Scoop.it

In What’s In a Boarding Pass Barcode? A Lot, KrebsOnSecurity told the story of a reader whose friend posted a picture of a boarding pass on Facebook. The reader was able to use the airline’s Web site combined with data printed on the boarding pass to discover additional information about his friend. That data included details of future travel, the ability to alter or cancel upcoming flights, and a key component need to access the traveler’s frequent flyer account. 

More recently, security researcher Michal Špaček gave a talk at a conference in the Czech Republic in which he explained how a few details gleaned from a picture of a friend’s boarding pass posted online give him the ability to view passport information on his friend via the airline’s Web site, and to change the password for another friend’s United Airlines frequent flyer account.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This article provides detailed examples and further reading links that shows why it is never a good idea to post pictures of barcodes on social networks. They can be read and the information they contain extracted - potentially revealing personal information.

You have been warned.

more...
prgnewshawaii's curator insight, August 26, 12:03 AM

Thanks to reporter Farid Mheir for this security alert. Be careful what you do with your airline boarding pass--it could compromise your identity.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

How a digital footprint is used to track you online and how to erase it

How a digital footprint is used to track you online and how to erase it | Digital Transformation of Businesses | Scoop.it
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity which involve differing levels of technology.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

A relatively technical explanation of the methods used to track people on the web.

more...
prgnewshawaii's curator insight, July 17, 11:49 AM

Thanks to reporter Farid Mheir for this look at how tracking technology follows you everywhere online. Nothing is private anymore.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

How to remain completely #anonymous and hidden #online

How to remain completely #anonymous and hidden #online | Digital Transformation of Businesses | Scoop.it
These are the steps you can take and the tools you'll need to remain anonymous and hidden online. Tor, VPN, burner emails, encryption, bitcoin, etc.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Discusses different solutions to remain anonymous online, from TOR to bitcoins.

more...
prgnewshawaii's curator insight, July 14, 5:35 PM

Thanks to reporter Farid Mheir for this fascinating post on how to remain anonymous online and largely invisible to most people. You'll need the Tor browser, a VPN, bitcoin, disposable e-mails, and a thorough knowledge of encryption.  If you're serious about leaving hackers and snooping government agencies behind, pay careful attention to the suggestions in this article.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover

Cybersecurity make headlines: How Business Is Protecting Itself is Fortune magazine July cover | Digital Transformation of Businesses | Scoop.it
Businesses are under attack from cybercriminals. Here’s what companies are doing to safeguard their digital assets from hackers.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Do I really need to say why. Just read it.

more...
prgnewshawaii's curator insight, July 2, 11:47 AM

Thanks to reporter Farid Mheir for this sobering report on what businesses are doing to mitigate the damage from cyber attacks. This is the new reality for business...it won't go away.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Best Password Managers 2017

Best Password Managers 2017 | Digital Transformation of Businesses | Scoop.it
To fully protect yourself online, you need a password manager. We've used and tested seven top brands to determine the best one.
Farid Mheir's insight:

Always good to know...

more...
prgnewshawaii's curator insight, June 26, 4:09 PM

Thanks to reporter Farid Mheir for this report on the best password managers for 2017.  Password managers are another layer of security you should add to your website or blog.

Russell Roberts

Hawaii Intelligence Diget

barkleysiskin's comment, June 27, 3:02 AM
amazing
Gregory Shapiro's curator insight, June 28, 11:56 AM

Too many logins to remember?  The best of the best in password managers which make a complex process simplicity

Scooped by Farid Mheir
Scoop.it!

2min video on how to pick the best #password

2min video on how to pick the best #password | Digital Transformation of Businesses | Scoop.it
Using password managers like LastPass and 1Password are essential to your online security — cyber security expert Kevin Mitnick explains why.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Only thing protecting you and your privacy is your password - and 2 factor authentication.  Do it!

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Amazing to see how so many people #trust companies & manufacturers with #security #privacy

Amazing to see how so many people #trust companies & manufacturers with #security #privacy | Digital Transformation of Businesses | Scoop.it

With the Supreme Court slated to rule next term on whether cellphone location data requires a search warrant, a new poll shows that a majority of U.S. adults support law enforcement accessing certain personal data for someone under investigation, but only if it's authorized by a warrant. Polling was conducted June 8 through June 12 among 2,200 U.S. adults. Morning Consult is the official polling partner of POLITICO, Vox, Fortune, and Bloomberg News.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

You have to trust companies and manufacturers with your private data to interact with them or use their products. What are people who distrust those companies doing? Not buying on Amazon? Not buying a smartphone? I guess not.

more...
prgnewshawaii's curator insight, June 22, 7:58 PM

Thanks to reporter Farid Mheir for this look at companies that most of us trust with our private data.  Considering how many data breaches amazon, facebook, and twitter have experienced, it's a bit surprising that we still trust these people with our personal data.  I suppose the trade off is worth it to many of us.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Cybersecurity’s Next Frontier: 80+ Companies Using Artificial Intelligence To Secure The Future In One Infographic

Cybersecurity’s Next Frontier: 80+ Companies Using Artificial Intelligence To Secure The Future In One Infographic | Digital Transformation of Businesses | Scoop.it

80 private companies in cybersecurity that are using AI and categorized them into 9 areas of operation.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

AI is infiltrating all industries and domains. Security is one of the fields where AI may provide the most value because protection relies so much on flexible solutions that can adapt - which is where AI is most useful.

more...
solidspug's comment, June 14, 4:40 AM
nice
Scooped by Farid Mheir
Scoop.it!

How one man managed to Accidentally Stop a Global Cyber Attack and how he did it #wannaCrypt #malware

How one man managed to Accidentally Stop a Global Cyber Attack and how he did it #wannaCrypt #malware | Digital Transformation of Businesses | Scoop.it
I believe they were trying to query an intentionally unregistered domain which would appear registered in certain sandbox environments, then once they see the domain responding, they know they’re in a sandbox the malware exits to prevent further analysis. This technique isn’t unprecedented and is actually used by the Necurs trojan (they will query 5 totally random domains and if they all return the same IP, it will exit); however, because WannaCrypt used a single hardcoded domain, my registration of it caused all infections globally to believe they were inside a sandbox and exit…thus we initially unintentionally prevented the spread and and further ransoming of computers infected with this malware. Of course now that we are aware of this, we will continue to host the domain to prevent any further infections from this sample.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Every system has its flaws, even malware and viruses. You just have to find them. This guy did and managed to stop a recent very bad version called WannaCrypt and this his explanation of how he did it. Fascinating read.

more...
prgnewshawaii's curator insight, June 10, 11:23 AM

Thanks to reporter Farid Mheir for this story of how an accidental discovery found a "kill switch" for the WannaCry ransomware.  We may not be so lucky next time.  More variants to WannaCry are appearing every week.  At least we have a clue to stopping this malignant software.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web | Digital Transformation of Businesses | Scoop.it

Instead of Google, Facebook, Twitter or LinkedIn owning your data, imagine a world in which you control the data about yourself and reveal only what is minimally necessary when required. It would be the web equivalent of proving to a bouncer only that you're older than 21, instead of also handing over your birthdate, address and whether you've elected to be an organ donor.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

To be in full control of our private information may be the holly grail of the Internet today. This new technology appears to solve the problem and provide a solution for all of us. For the moment in trial for developers, I can't wait to try it out....

more...
prgnewshawaii's curator insight, June 1, 12:50 AM

Thanks to reporter Farid Mheir for this enlightening report on development of a browser that secures your privacy.  I'm looking forward to this new technology.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs on Security

Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs on Security | Digital Transformation of Businesses | Scoop.it

To demonstrate the flaw, Mursch logged into his account at True Health and right clicked on the PDF file for his latest health report. He showed how the site would readily cough up someone else’s detailed health records and blood tests if he modified a single digit in the link attached to that PDF record and then refreshed the page.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

We delegate our privacy to the companies we interact with every day: Google for emails and photos, banks for cash, credit cards for transaction data, governments for our taxes and medical clinics and labs for our health data. Well this story shows that health clinics should take care to secure and protect our health data more securely. By the way, the breach exposed here is very basic to prevent and should never occur in today's world of technology. Depressing...

more...
prgnewshawaii's curator insight, May 12, 2:01 AM

Thanks to reporter Farid Mheir for this sobering looks at the security vulnerabilities of your health records. There is no excuse for this lapse of security.

Russell Roberts

Hawaii Intellilgence Digest

Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | Digital Transformation of Businesses | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

more...
GLOBALHACKERS.RU's curator insight, May 7, 8:34 AM


UNBELIEVABLE,THIS IS SO TRUE...!!!,HOW I MADE $500,000.00 DOLLARS JUST IN 2 DAYS..VISIT >>WWW.WUBUGZ.NET

HACKED PAYPAL transfer,hacked WESTERN UNION transfer, BANK TRANSFER, MONEYGRAM TRANSFER/LOGINS, CCTOP UP visit www.wubugz.net

GET 100% LEGIT HACKED PAYPAL ACCOUNTS/transfers,WESTERN UNION transfers,BANK TRANSFER,MONEYGRAM TRANSFER/LOGINS,CCTOP UP,

>> WWW.WUBUGZ.NET

**** WE PROVIDE LIVE SCREEN SHARE OR VIDEO PROOF OF ACCOUNTS OR TRANSFERS BEFORE PAYMENT IS MADE!.

****WE DO NOT SELL ANY FAKE WU BUG SOFTWARE, NO DUMB PAYPAL MONEY ADDERS, NO PAID TO CLICK, FOREX,HYIP...

****WE DEAL STRICTLY ON TRANSFERS AND LOGINS.

ALL transfers are legit and backed by secure dedicated offshore servers..

****no charge back or trace backs.

we have moneyback and Rienburstment policy with 24/7 support.

official website---visit http://www.wubugz.net

contact email _____ wubugs58@gmail.com
contact skype ______ wu hackerz
contact website_____ www.wubugz.net
contact icq ______ 701247445
contact phone ______ +1(251-589-7809
contact fb ______ wubugz

OR
blogs---http://wubugz.blogspot.com/

https://turbopurchase.wordpress.com/

>>>>>>> *** www.wubugz.net*** <<<<<<<>>>>>>>>> Visit *** www.wubugz.net *** for real screenshot proof of accounts and transfers.

prgnewshawaii's curator insight, May 7, 11:47 AM

Thanks to reporter Farid Mheir for this article, which reinforces the idea of using non-repeatable and strong passwords, as well as two-factor authentication online.

Russell Roberts

Hawaii Intelligence Digest

argonapproach's comment, May 8, 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

2017 DBIR: Understand Your Cybersecurity Threats

2017 DBIR: Understand Your Cybersecurity Threats | Digital Transformation of Businesses | Scoop.it

The 2017 DBIR reveals what’s really happening in cyber security. This year’s report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. That means you get a detailed insight into the cyber security threats you face.

Read the report and discover:

  • The biggest cyber security threats in your sector and what you can do to mitigate them.
  • Who’s behind the attacks and how they’re getting in.
  • What motivates the cybercriminals.
  • How nine incident patterns can help you predict what the cybercriminals will do next.

 

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This annual report on cybersecurity from Verizon is one of the best as it analyzes data from 2,000 breaches to draw a portrait of cybersecurity threats that is factual. Must read.

more...
prgnewshawaii's curator insight, May 4, 4:49 PM

Thanks to reporter Farid Mheir for this comprehensive report on cybersecurity threats.  Read and thoroughly understand what's reported in this document--your business may depend on it.


Russell Roberts


Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW | Digital Transformation of Businesses | Scoop.it
Many of the world’s largest online and mobile properties offer 2FA to help prevent fraudulent activity and protect your accounts. To see if the sites and apps you use offer 2FA, and to get detailed step-by-step instructions on how to Turn It On, start here.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Maybe the most important security measure you can take today, this 2FA website gives step-by-step guidance on how to enable it on most popular websites like Apple, Google, Facebook and others. 

For more on protection your digital self, read this blog post and do the other 9 actions in there: http://fmcs.digital/blog/digital-moi-get-started-10-actions/ 

more...
prgnewshawaii's curator insight, May 4, 2:32 AM

Thanks to reporter Farid Mheir for this well-timed advice on "hardening" the security of your web or blog site.  Two factor authentication is a must for adding an additional layer of security to your online presence.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist | Digital Transformation of Businesses | Scoop.it
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

The Economist has made its April 08 cover "why computers will never be safe" to clearly state that we should all come to terms with the fact that improving our digital security and privacy will come from policies, rules and regulations, as it is impossible to ensure computer systems are built to be safe and un-hackable. I tend to agree with the statement and the conclusion, although I remain confident that over time the computer industry will find a way to make its systems safe by design. But we will live with a legacy of un-secure systems for many decades, so we must learn to deal with it.

more...
argonapproach's comment, May 8, 6:10 AM
nice
Scooped by Farid Mheir
Scoop.it!

How Was Your Credit Card Stolen? #mustRead explanation via @BrianKrebs 

How Was Your Credit Card Stolen? #mustRead explanation via @BrianKrebs  | Digital Transformation of Businesses | Scoop.it

This post provides a primer on the types of card fraud and the likelihood with each of the cardholder ever learning how their account was compromised.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

I always wondered how thieves steal my credit card number and this post is a very good explanation. It shows where I should be careful about my credit card use and, for business, where to look to improve security.

more...
prgnewshawaii's curator insight, March 28, 10:40 AM

Thanks to reporter Farid Mheir for this bit of wisdom. A good introduction to credit card fraud and how not to become a victim of this credit theft.


Russell Roberts


Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing 

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing  | Digital Transformation of Businesses | Scoop.it

The US Department of Homeland Security used software to scan social media accounts of people visiting America, but it didn't work properly.

Under President Obama, the government considered asking people to voluntarily submit social media profiles, but since the election of President Trump the scheme may become mandatory and more invasive.

The new boss of the US Department of Homeland Security, John Kelly, has said that such checks should be mandatory and travelers should also be forced to provide passwords and banking records. This may take weeks or months, he said, but people will just have to wait before visiting this shining city on the hill.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Besides the obvious invasion fo privacy, this may actually hint at what the future may look like with the miniaturization of cell phones, the presence of heads-up displays and augmented reality. When meeting someone, or simply crossing someone on the street, face recognition and other tools may search the web to provide insights about people we cross and stand in line at the checkout counter. 

The impact of such constant surveillance may increase an already high fear of others or increase the impact of wrongful information about ourselves that may reside online.

Even more reasons to protect your digital twin and ensure your digital footprint is minimal.

Follow these links for more.

- know your digital twin: fmcs.digital/blog/digital-twin

- 10 actions to take to protect your digital twin: fmcs.digital/blog/digital-moi-get-started-10-actions 

more...
prgnewshawaii's curator insight, March 20, 12:30 AM

Thanks to reporter Farid Mheir for this unsettling look at what our digital future holds for us. Shades of the Orwell classic, "1984". Welcome to a world we really didn't expect.  Reality stings at times. All the more reason to reduce your digital footprint.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

8 tips to encrypt your entire life in less than an hour

8 tips to encrypt your entire life in less than an hour | Digital Transformation of Businesses | Scoop.it

Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson's disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Start by reading this article then read my top 10 things to do along the same lines: fmcs.digital/blog/digital-moi-get-started-10-actions 

more...
prgnewshawaii's curator insight, March 11, 12:25 AM

Thanks to reporter Farid Mheir for this cautionary tale about protecting our lives from unwanted intrusions.  The advice is sound and prophetic.  Ignore this warning at your own risk.

Russell Roberts

Hawaii Intelligence Digest

https://hawaiiintelligencedigest.com

https://paper.li/f-1482109921

Scooped by Farid Mheir
Scoop.it!

Ransomware for Dummies: Anyone Can Do It via @BrianKrebs 

Ransomware for Dummies: Anyone Can Do It via @BrianKrebs  | Digital Transformation of Businesses | Scoop.it

Among today’s fastest-growing cybercrime epidemics is “ransomware,” malicious software that encrypts your computer files, photos, music and documents and then demands payment in Bitcoin to recover access to the files. A big reason for the steep increase in ransomware attacks in recent years comes from the proliferation of point-and-click tools sold in the cybercrime underground that make it stupid simple for anyone to begin extorting others for money.

Recently, I came across an extremely slick and professionally produced video advertisement promoting the features and usability of “Philadelphia,” a ransomware-as-a-service crimeware package that is sold for roughly $400 to would-be cybercriminals who dream of carving out their own ransomware empires.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Some people wonder if ransomware is real or popular. Here is the answer.

more...
prgnewshawaii's curator insight, March 9, 6:32 PM

Thanks to reporter Farid Mheir for this fascinating and somewhat scary introduction to Ransomware as a business.  Ransomware developers are so sure of their product that they are offering a fairly cheap ransomware-as-a-service package to help aspiring "businessmen/businesswomen" get started in their own malware companies.  This would be a joke if it weren't so serious.  This direct marketing approach is so blatant that it makes you wonder what we can do to stop its proliferation.

Russell Roberts

Hawaii Intelligence Digest

https://hawaiiintelligencedigest.com

https://paper.li/f-1482109921

Scooped by Farid Mheir
Scoop.it!

Fake Chrome Font Pack Update Alerts Infecting Visitors with Spora Ransomware via @BleepinComputer1

Fake Chrome Font Pack Update Alerts Infecting Visitors with Spora Ransomware via @BleepinComputer1 | Digital Transformation of Businesses | Scoop.it
Yesterday, Brad Duncan, a Threat Intelligence Analyst for Palo Alto Networks Unit 42, wrote a blog article discussing how the EITest Chrome Font Update campaign, which was previously discovered by Kafeine, is now distributing the Spora Ransomware instead.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

I wrote about social engineering in the past and find this to be one of the most important security concern we should have when thinking about digital transformation: the end user. It is essential to educate users so they do not fall prey to scams like this one.

 

See here fro more on this topic: fmcs.digital/blog 

more...
prgnewshawaii's curator insight, February 24, 1:19 AM

Thanks to reporter Farid Mheir for this new ransomware warning. The key to defeating this internet scourge is employee and management education.  Situational Intelligence should be part of every company's training program.

Russell Roberts

Hawaii Intelligence Digest

https://hawaiiintelligencedigest.com

https://paper.li/f-1482109921

Curated by Farid Mheir
Digital transformation technology consultant and Enterprise Architect. Works with business executives in the fields of eCommerce, Cloud, Web2.0, enterprise2.0, sourcing2.0