Month: February 2018

Over 3,000 Databases with 200 Million Unique accounts found on Dark Web

Dark Web is a strange place where one can conduct all sorts of illegal activities including selling illegal drugs, weapons, social security numbers, documents and stolen data. Recently, the social engineering experts at breach notification website Hacked-DB discovered a massive trove of data containing login credentials of millions of users on the dark web.

In total, Hacked-DB told HackRead they have discovered 3,000 databases containing 200 million unique user accounts including containing email addresses, potential personally identifiable information, potential financial accounts, unique IP addresses, unique account identifiers and other highly sensitive information linked to organizations and individuals all around the world.

The vast majority of these compromised databases were not detected prior to this leak and the overall size of the files leaked is 9GB. The leak includes databases from 2011 to today in 2018, and the information includes personal accounts with cleartext or hashed passwords that can easily be reversed to the password itself.

 

3,000 Database with 200 Million Unique accounts exposed on Dark Web
Leaked accounts (left) – Targeted databases (right)

Hacked-DB Chief Operation Officer Mr. Yogev Mizrahi told HackRead that: “This leak is extremely interesting from a hacker’s point of view since it can potentially give adversaries a fairly large ground of identities to work with when it comes to identifying theft and such”.

Hacked-DB CEO Mr. Chen Heffer said that “These leaks go mostly under the radar since they are not published to the public anywhere and by no one. Our team of white hat hackers in Hacked-DB work 24/7 in looking for this type of information in the dark web to bring the value-add to our clients and help organizations protect their IP and identities”.

What might be worrisome is the fact that the data is available for anyone to download on a file-sharing website and it is only a matter of time before malicious actors get their hands on it.

The full list of targeted databases whose data was found by Hacked-DB is available here.

Previously, owner of HaveIbeenPwned Troy Hunt discovered Anti Public Combo List and Exploit.in dumps with billions of user accounts and just a few days after, both lists were available for download on the Dark Web and hacking forums.

Moreover, In December last year, 4iQ researchers also discovered a 41GB data file containing 1.4 billion billion login credentials including emails and passwords in clear-text format. However, the recent finding from Hacked-DB shows there is a ton of data on the Dark Web which poses a massive threat to the user as well as the targeted firms since either none of them have any idea about the breach or the companies are hiding it from users.

Microsoft Excel Windows Command explained

Here are the main things you should know about Excel Windows command…

 

 

 

In my previous article, I have talked about some of the facts you should know about Microsoft Excel User Interface, you can visit that sections to read it through.

 

 

My focus for this article is to tell you some of the functions of the Excel Windows command which I believe you can find in other Microsoft Office applications as well. 

 

Here are the Windows commands you should know…

 

#1 minimize button

The Minimize button hides the entire Excel 2013 User Interface. The application will remain open.  With this, the Excel 2013 still appears on the Window Taskbar but it will not be open wide in the Window.

 

microsoft excel windows command

#2 maximize/restore down button as part of excel windows command

This command reduces the size of the Microsoft Excel user interface from full screen to smaller sized Window.

 

It also minimizes a smaller window back to full screen. In addition. Furthermore, when the window is reduced in size, you can drag the bottom-right corner of the User Interface to resize the Excel Window to suit your needs.

 

#3 close button as part of excel windows command

Also, The Close Button closes the currently selected workbook. If there is only one Excel Workbook file open when you select the Close button, the entire application closes too.

 

 

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. Thanks.

   

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

 

Be Aware!! Hackers spread Android spyware through Facebook using Fake profiles

The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook.

There are almost 2 billion monthly active users on the social media giant Facebook and that makes it one of the most lucrative targets for hackers and cybercriminals. Recently, the researchers at Czech IT security researchers at Avast reported a sophisticated campaign in which attackers used Facebook and Facebook messenger to trick users into installing a highly sophisticated Android spyware. (more…)

7 parts of outer Microsoft Excel Interface

This article talks about outer Microsoft Excel user interface…..

 

 

In a nutshell, the User Interface the buttons and commands that you can use to interact with Microsoft Excel. This also includes the Ribbon which stands at the top of the Microsoft Excel window.

 

outer Microsoft Excel User Interface

 

Without wasting much time, let’s start talking about these user interfaces element one after the other.

 

First and foremost, we have the Title Bar in the outer Microsoft excel user interface.

 

The Title bar is the portion that shows the name of the document. It is always at the top of the Windows when it opens.

 

The Ribbon provides you with access to the most commonly used commands for working with Excel workbooks and worksheets.

 

 

The Ribbon is organised into a series of tabs, each containing groups if related commands. Note that also customize the Ribbon to suit your need. More on that in my subsequent articles.

 

 

The Formula bar displays the contents of the currently selected cell in a worksheet.

 

The selected cell is always referred to as the Active Cell. It is also possible to use the Formula to enter or edit content. Whatever you entered there will always go into the active cell.

 

And others like it…

The Name Box displays the cell reference for the currently selected cell or the cell reference of the active cell in the currently selected range. The Name Box can also display custom range names and can be used to navigate to a particular cell.

 

 

We can also talk about the Quick Access Toolbar. It provides you with easy access to commonly used Excel commands, such as Save, Undo and Redo. You can customize it to suit your need. I will write about how to do that in my future articles.

 

 

The Status Bar as part of outer Microsoft Excel User Interface displays the status of various conditions pertinent to Microsoft Excel, such as the mode of the active cell and whether or not Cap Locks or Number Lock is enabled.

 

 

You can customize what information is displayed on the status bar as well.

 

Also, the View and Zoom controls provide you with access to commands that change the current workbook view and change the magnification of the displayed worksheet. 

 

 

 Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. Thanks.

   

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

 

 

 

How to reference Range and Cells in Excel

This article talks about how to reference range and cells in Microsoft Excel…

 

In my previous article, I have already talked about Cells and Range.  What I did not discuss in that article is how you can give a cell or range a name.

 

 

How do you reference range when you have something to do with it. Let’s find out how to do that in this article.

 

reference range

First and foremost, in Microsoft Excel, Cells are identified by using cell references. You have to think of a cell reference as the name of a cell, used to differentiate it from among the other cells on a worksheet.

 

 

A cell reference consists of a letter and a number. The letter refers to the column border in Microsoft Excel, whereas the number refers to the new headers.

 

So, the cell on a worksheet that is located at the intersection of Column C and row 5 has the cell reference C5.

 

Furthermore, column Headers are displayed along the top of an Excel worksheet and are used to differentiate individual columns.

 

 

Columns headers begin with a letter A for the first column and run through the course of the entire alphabet. 

 

Also, Microsoft Excel supports far more column in a single worksheet than 25 letters of the alphabet.

 

 

A worksheet can contain up to 16, 384 columns. After letter Z, column headers continues through with AA after AZ comes to BA through BZ and so on and so forth.

 

 

Once the column headers have been exhausted, all of the possible combinations through ZZ, they continue with three letters such as AAA through ZZZ. 

 

 

By and large, row Headers are displayed along the left side of an Excel worksheet and are used to differentiate individual rows.

 

Row headers begin at 1 and increase sequentially through row 1,048,576. The last possible cell in Excel is XFD1048576.

 

One can use Range references to identify particular ranges of data in your worksheet. A range reference consists of two cell references separated by a colon.

 

The first cell reference identifies the top leftmost cell in the range; the second cell reference identifies the bottom rightmost cell in a range. For example, the range of cells that include the first five rows in columns A through D is A1: D5..

 

 

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. Thanks.

   

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Global Cost of Cybercrime Exceeded $600 Billion in 2017, Report Estimates

The global cost of cybercrime rose to unprecedented levels in 2017, according to recent research.

In its new report titled “Economic Impact of Cybercrime — No Slowing Down,” McAfee and the Center for Strategic and International Studies (CSIS) revealed that cybercrime cost the world between $445 and $608 billion in 2017. That is $100 billion more than the minimum worldwide cost estimated for 2014.

What’s Driving Up the Global Cost of Cybercrime?

The report’s authors attributed this increase to five trends, most notably the rise of ransomware. The FBI noted that victims of ransomware paid $209 million to recover stolen files in the first quarter of 2016, a significant increase over the $24 million in ransom payments made throughout the year prior, SC Magazine reported.

In addition, 70 new cryptomalware strains emerged over the course of the year, more than double the number of ransomware samples that emerged between 2013 and 2015. The threat of ransomware arguably reached its peak in Q1 2017 with the WannaCry outbreak before declining in the next six months as cryptominers surged in popularity among computer criminals.

Cybercrime-as-a-service, a greater reliance on anonymization services such as Tor, the rise of state-sponsored theft, and the increasingly popularity of both identity theft and intellectual property theft also drove up the cost of cybercrime in 2017, according to the report.

Reducing the Cost of Cybercrime

Responding to these trends, McAfee chief scientist Raj Samani noted that organizations can protect themselves against cybercriminals by improving their internal communication channels.

“Businesses often struggle to remain vigilant against threats because they have too many tools operating in silo at once — and failing to communicate with each other,” he said, as quoted by Infosecurity Magazine. “By making sure that tools can work together and removing siloed security teams, organizations can find the right combination of people, process and technology to effectively protect data, detect threats and, when targeted, rapidly correct systems.”

Cells and Ranges in Microsoft Excel

 

introducing Cells and Ranges in Microsoft Excel…

 

 

 

Microsoft Excel is a powerful tool. I can boldly say that no matter the environment that you find your self, Microsoft Excel is suitable for your needs.  The sad part of it is that majority of those that need Microsoft Excel do not know anything about the application. In this article, I want to tell you about some of the facts that you should know about it. I will be talking about Cells and Ranges in Microsoft Excel.

 

An Excel worksheet is arranged in tabular format. That means it consists of a series of columns and rows that intersect to form cells. A cell can be seen as a singular container that you can use to input and store data.

 

 

cells and ranges

 

Like the place where I put “PAT NO” can be referred to as a cell. They are rectangular in nature. They have the ability to expand as you input more letters or figures.

 

Each individual rectangle that you see on an Excel worksheet is a separate cell. Some type at the time and they will feel that it has spilt over to the other cell. 

 

In introducing cells in Microsoft Excel, a range can be seen as a group of cells that typically contains related data. A range can consist of an entire row or column, a group of cells in a row or column, or a group of cells that covers multiple rows and columns. One can also use ranges to organize your worksheets by related sets of data.

 

 

 

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. Thanks.

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Identity Fraud Affected 16.7 Million U.S. Consumers , Report Reveals

The number of identity theft victims rose by 8 percent to 16.7 million U.S. consumers in 2017, according to a new report.

Javelin Strategy & Research’s “2018 Identity Fraud Study” revealed that identity thieves preyed upon 1.3 million more victims in 2017 than they did the previous year by adapting to changing technologies and regulations. This flexibility enabled bad actors to steal a total of $16.8 billion from unsuspecting U.S. consumers. (more…)

The creator of NanoCore RAT Sentenced to Jail

A Hot Springs, Arkansas man who last year admitted in court to creating the NanoCore RAT (Remote Access Trojan) was sentenced to 33 months in prison.

Taylor Huddleston, 27, was sentenced on Friday for helping and assisting with computer intrusions through the development and marketing of malicious software, the Department of Justice announced. The programs he created were used to steal sensitive data from victims, spy on them, and conduct other illegal intrusions.

In addition to the 33 months in prison, Huddleston was ordered to serve two years of supervised release following his prison sentence.

Accused of developing, marketing, and distributing two malware families, Huddleston pleaded guilty in court in July 2017.

The first malicious program Huddleston developed is the NanoCore RAT, a backdoor that allows attackers to steal information from victim computers, including passwords, emails, instant messages, and other sensitive data. Used to infect and attempt to infect tens of thousands of systems, the RAT allows attackers to activate infected machines’ webcams to spy on victims.

NanoCore RAT was used in attacks targeting the finance departments of small and medium-sized businesses in the U.K., the U.S. and India, as well as in other global infection campaigns. Distribution methods included, among others, fileless tricks to the abuse of free Voice-over-IP (VoIP) service Discord.

Huddleston also admitted to creating Net Seal, licensing software that allowed him to distribute malware for co-conspirators for a fee. Huddleston is said to have used Net Seal to assist Zachary Shames in his attempt to infect 3,000 systems with malware that was in turn used to infect 16,000 computers.

Huddleston built Net Seal in 2012 and created NanoCore in 2014 (he marketed the RAT as a remote desktop management utility.

In his guilty plea last year, Huddleston admitted that he intended the programs to be used maliciously.

Data encryption method in security

 Six major uses of Data encryption method…

 

Data Encryption can be seen as the process of protecting data that is been sent from one person to another. It is done so that those that hijack the information. If they do, they will not be able to make any sense out of it.

 

 

In my previous article, I have talked about some of the terminologies that you should know as regard data encryption. You can read that article here. 

 

data encryption method

 

Now let us look at some of the ways that Data encryption can be used.

 

 

First and foremost, data encryption can be used to protect users credentials. We want to be sure that what is been sent between two private individuals does not leak to an outsider.

 

This will help to guarantee the confidentiality of information being passed from one person to another.

 

 

 

Also, data encryption also provides a secure medium for users to connect with their friends or employees network from outside the home or office environment.

 

With it, you can be away and still communicate with people that matter to you. This will go a long way in creating a secure and safe network connection.

 

 

In addition to that, data encryption can be used to protect important information. It is been used as a web-based information.  This protects important data that we will not want to leak to the general such as credit card information or password.

 

 

Like I said in my previous article, one of the basic features of data encryption is that the user cannot deny not sending the message. These features help to provide a secure environment for sending and receiving of messages. 

 

 

One other benefit of the use of data encryption is that it provides a higher level of trust between the sender and the receiver. It ensures that the source of messages is trusted. This makes correspondent actions possible. 

 

 Confidential Information…

 

Also, the use of Data Encryption method ensures that confidential information is properly stored. This at times can be stored in the computer. It can also be stored on external storage of your choice.

 

 

 

Action Point

If you enjoy our article, sign up to get our next article in your inbox.

 

 

You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us. Thanks.

   

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.