How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…Seniors: How to Keep Your Retirement Safe from Online Scams
The growing number of internet crimes targeting senior adults is mind-blowing. In 2021, more than 92,000 people over the age of 60 reported losses of $1.7 billion, according to IC3, the FBI’s Internet Crime division. That number reflects a 74 percent increase in losses from 2020. These numbers tell us a few things. They tell […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…How to Spot Fake Login Pages
Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals. Fake Login Pages Explained A fake login page is essentially a knock-off of […] more…Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Special Delivery: Criminals Posing as Amazon Are Out to Steal User’s Data
One of the joys of online shopping is instant gratification – your purchases arrive on your doorstep in just a few days! Unfortunately, consumers aren’t the only ones taking advantage of this convenience – hackers are also using it to trick users into handing over money or data. Recently, AARP recounted several scams where cybercriminals posed as Amazon’s customer […] more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years by trying to get other people interested in you.” ~ Dale Carnegie Each year it’s my tradition to re-read a handful of books that continue to shape my perspective. One of those books is the […] more…KBOT: sometimes they come back
Although by force of habit many still refer to any malware as a virus, this once extremely common class of threats is gradually becoming a thing of the past. However, there are some interesting exceptions to this trend: we recently discovered malware that spread through injecting malicious code into Windows executable files; in other words, […] more…Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded in return for access to […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…More information
- Expired Google certificate temporarily disrupts Gmail service
- Privileged Access Management Provider Remediant Raises $15 Million
- ‘Leccy-stealing, grid-crippling hackers could TAKE DOWN EV-juicing systems
- Microsoft Internet Explorer CVE-2013-5048 Memory Corruption Vulnerability
- Are you watching your TV or is your TV watching you?
- Malware uses Google Docs to communicate with control hub
- HackerOne Raises $36.4 Million in Series D Funding Round
- Microsoft Windows Hyper-V CVE-2017-0163 Remote Code Execution Vulnerability
- Cloudflare bug exposed passwords, other sensitive data from websites
- News in brief: Uber under fire in ‘Hell’ lawsuit; Europe could be hit by laptop ban; Fancy Bear ‘targeted Macron’