Tag Archive for: Facts

Activities, History, FAQs, Dates, and Facts About computer security


National Computer Security Day 2023: National Computer Security Day is observed annually on November 30. Cybersecurity impacts every aspect of our lives, including our financial transactions, political elections, and spending habits. We cannot afford another MyDoom, the most destructive email virus in history, that wreaked havoc costing $38.5 billion; therefore, let’s educate ourselves on online safety!

National Computer Security Day History

It seems as though we hear about cybersecurity breaches every day. Globally, ensuring the online security of individuals and organizations is of the utmost importance. It is a thought that occupies a prominent position in our thoughts on National Computer Security Day. National Computer Security Day has a fascinating history.

Researchers from Cornell University discovered an unidentified pathogen infiltrating their computer systems on November 2, 1988. Four hours after its initial discovery, the “Morris worm” malware infiltrated a number of additional university systems, including the ARPANET, which served as an early prototype of the contemporary internet.

Six days later, two Defense Advanced Research Projects Agency (DARPA) computer experts advised the formation of a “National Computer Infection Action Team” (NCAT) to respond to these types of attacks around the clock, 365 days a year. The Software Engineering Institute (SEI), a Carnegie Mellon University-affiliated research facility, established the Computer Emergency Response Team (CERT) on November 14.

The Washington, D.C. chapter of the Association for Computing Machinery’s (ACM) Special Interest Group on Security, Audit, and Control established National Computer Security Day in 1988 to bring attention to cybercrimes and infections. As stated in an article from “Networld” in 2004, the selection of November 30 as Computer Security Day (CSD) was intended to maintain a heightened awareness of security concerns amidst the holiday season, a time when individuals are generally preoccupied with holiday shopping rather than preventing security breaches. CERT and the Department of Homeland Security of the United States merged in 2003 to establish the National Cyber Awareness…

Source…

Phishing Attacks Statistics & Facts 2023


In today’s digital landscape, phishing attacks have become a persistent threat, jeopardizing the security and privacy of individuals and organizations alike. Understanding the scope and impact of these threats is crucial for implementing effective cybersecurity measures or avoiding potentially debilitating costs. 

Phishing statistics can serve as a reliable visual of the real threat behind phishing attacks. With disparate sources online, we’ve pulled together data about the overall impact of phishing attacks through the examination of phishing data on the global economy.

Phishing Statistics Highlights

  • Phishing attacks account for 36% of all US data breaches.
  • 83% of all companies experience a phishing attack each year.
  • There was a 345% increase in unique phishing sites between 2020 and 2021.
  • There were 300,497 phishing attacks reported to the FBI in 2022.
  • Each phishing attack costs corporations $4.91 million, on average.

Summary of Types of Phishing Attacks

Phishing scams account for nearly 36% of all data breaches, according to Verizon’s 2022 Data Breach Report. And according to a Proofpoint study, 83% of all companies experienced a phishing attack in 2021. 

Here are some of the most common phishing attacks an organization could face: 

Phishing Type Explanation
Email Phishing
  • The most prominent form of phishing.
  • The attacker sends a deceptive email that appears to be from a legitimate source.
  • The emails often demand sensitive information, such as login credentials, social security numbers, or financial details.
Spear Phishing
  • A more targeted form of attack.
  • The attacker does prior research on an individual to create personalized messages.
  • This can increase the likelihood of success, as the sender appears more credible and informed.
Whaling
  • Targets high-profile individuals, such as senior managers or executives.
  • The attacker tailors correspondence to people working below their target, often encouraging the subject to transfer funds or give up other important information.
  • This allows the attacker further access to the system.
Pharming
  • Involves redirecting users to fraudulent websites that mirror the actual website.
  • The attacker aims to get the user to enter…

Source…

Computer security day #shorts



Jesse Watters spins facts beyond recognition with claims that Hillary Clinton paid to hack and frame Trump


Fox News host Jesse Watters falsely accused Hillary Clinton of paying hackers to break into former President Donald Trump’s computers and plant fabricated evidence that would frame Trump for collusion with the Russian government.

The elaborate scheme Watters described is a massive distortion of a Feb. 11 court filing that has attracted attention from conservative media in the week after it dropped.

The filing came from special counsel John Durham, selected by former Trump Attorney General William Barr to examine the reasons for the Justice Department’s investigation into Russian interference in the 2016 election. Special counsel Robert Mueller led the initial investigation that culminated in a report published in 2019.

Watters claimed Durham’s work now implicates Clinton.

“If there was ever any doubt that Clinton was behind the Russia hoax, that’s officially gone,” Watters said on his prime-time show Feb. 14. “Durham’s documents show that Hillary Clinton hired people who hacked into Trump’s home and office computers before and during his presidency, and planted evidence that he colluded with Russia. Yeah. You heard that right.”

“Hillary broke into a presidential candidate’s computer server and a sitting president’s computer server, spying on them,” he went on. “There, her hackers planted evidence, fabricated evidence connecting Trump to Russia, then fed that doctored material to the feds and the media.”

None of what Watters said on that program about an effort to hack and frame Trump with fake evidence is borne out by Durham’s filing, which he cited. The document never even mentioned hacking.

Still, the narrative echoed elsewhere on Fox News, where talk of hacking and an offense “worse than Watergate” stretched across programs, according to TVEyes, a media monitoring service.

The chyrons on “Jesse Watters Primetime” on Feb. 14 focused on Hillary Clinton and special counsel John Durham’s investigation. (PolitiFact)

One of the first headlines posted to Fox News’s website inaccurately declared that the Clinton campaign paid to “infiltrate” Trump’s servers. The word “infiltrate” was never used in…

Source…