The purpose of this assignment was to research real-world examples of cybersecurity and analyze what went wrong while coming up with potential solutions.
North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS
Crypto firms have been getting attacked by North Korean hackers with seemingly harmless PDF files after enticing them with bogus job opportunities and corporate investments. The method described was phishing, and with crypto firms relying on their technological prowess to earn money, the companies most likely took substantial damage to their reputations and numbers. A potential solution to this kind of attack could be to have a program to track suspicious files, but that is difficult to have in this scenario where the app was approved by Apple. To help, always checking the source of the email and not clicking on files that look like they don't belong will help in the future.
Author: Ravie Lakshmanan
Location: The Hacker News
Date: November 7, 2024
Integrity: Considered accurate, had the right information, and had quotes from employees in the crypto firms.
Presentation: Pretty straightforward, not many ads, and no major grammatical errors.
Links and Citations: Only links were to the page's Twitter and LinkedIn
Microsoft reveals ransomware attacks against its customers nearly tripled last year
Customers of Microsoft have been receiving ransomware attacks a lot more frequently in the last year. Ransomware locks your technology and the criminal demands a price for your systems to be back up and running. Microsoft, with its reputation of being one of the premier technology brands, might have received a blow in reputation when this started happening. To prevent ransomware attacks is hard, but making sure that your systems are properly running, having protection software installed, and using safe web habits will prevent unnecessary breaches.
Author: Matt Kapko
Location: Cybersecurity Dive
Date: October 16, 2024
Integrity: Considered accurate, information is detailed, also had data to show evidence
Presentation: Straightforward, not many ads, and no breaks in the article
Links and Citations: Links to other related articles were embedded in the article