Report: Gaming Addiction is a Real Thing. So What Can Parents Do Next?
It’s one of my biggest parenting regrets to date: About a decade ago, I failed to put limits around my teen’s passion for playing video games. He loved them, and I let him. I convinced myself that my son’s video gaming provided him with an instant community where he daily climbed to the top of the […] more…What Parents Need to Know About the Popular App Mappen
Kids love their apps but in their excitement to download the new ones, app safety often falls straight off their radar. One of those new, fun, not-so-safe apps is Mappen. Kids, pre-teens specifically, are jumping on Mappen to connect with friends nearby and, as the app’s tagline encourages, “Make Things Happen.” The location-based app allows […] more…Modern OSs for embedded systems
At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other words, the internet of things). Our primary interest is how and to what degree these OSs can solve cybersecurity-related issues. We’d like to point out […] more…Play The Game – Tips and Tricks for Safe Online Gaming
When I was child, gaming was all joysticks and arcades. Now, it’s all about hyper realistic graphics, immersive experience and above all, playing online against players from all over the world. Since the early 2000s, we’ve seen online gaming grow into a worldwide phenomenon, increasing hugely in popularity among children and adults alike and expanding […] more…Vacation Checklist: 5 Easy Ways to Help Secure Your Family’s Devices When Traveling
With this writing, we’re joyfully en route to a much-anticipated Florida vacation. A sneak peek into our car — and the thousands of other cars headed south on Interstate 4 — offers a reflection of family life today. Mom has her earbuds on and is listening to her newest audiobook, Dad is nodding along with […] more…#CyberAware: 4 Actionable Steps to Boost Your Family’s Safety Online
Summer has officially rolled out its welcome mat. But as most parents might be thinking about slowing down, for most kids, summer is when digital device use goes into overdrive. That’s why June — which also happens to be Internet Safety Month — is a perfect time strengthen your family’s digital readiness. Good news: This […] more…Capgemini to Acquire Leidos Cyber
French IT consultancy firm Capgemini announced Thursday an agreement to acquire Leidos Cyber from the U.S.-based Leidos. The acquisition is subject to anti-trust and Committee of Foreign Investment in the United States (CFIUS) approvals, and is expected to complete before the end of 2018. Financial terms have not yet been disclosed. read more more…Netkids
Children today are completely at home in the digital space. They use digital diaries and textbooks at school, communicate via instant messaging, play games on mobile devices (not to mention PCs and consoles), and create mini masterpieces on tablets and laptops. This total immersion in the digital universe is a concern for many parents, but […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Spam and phishing in Q1 2018
Quarterly highlights Data leaks Early 2018 will be remembered for a series of data leak scandals. The most high-profile saw Facebook CEO Mark Zuckerberg grilled by US Congress, with many public figures supporting the Delete Facebook campaign. As a result, Zuckerberg promised to get tough and make it more difficult to harvest data from third-party […] more…It’s a Zoo Out There! Data Analysis of Alleged ZooPark Dump
In early May, researchers disclosed a Mobile malware campaign by a group focused on Middle Eastern targets. This actor was found to be an evolving and sophisticated group using fake Android apps, namely Telegram, to trick users into installing malicious software. They have been active since 2015 and evolved over several campaigns into 2018. On […] more…No Evidence Russian Hackers Changed Votes in 2016 Election: Senators
Hackers backed by the Russian government attempted to undermine confidence in the voting process in the period leading up to the 2016 presidential election, but there is no evidence that they manipulated votes or modified voter registration data, according to a brief report published on Tuesday by the Senate Intelligence Committee. read more more…The King is dead. Long live the King!
In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons. The following article will examine the core reasons behind the latest vulnerability, CVE-2018-8174. Searching for […] more…NCSC Joins Secure Chorus to Promote End-to-End Secure Communications
The UK’s National Cyber Security Center (NCSC) has become the first government agency to join Secure Chorus, a not-for-profit private company limited by guarantee, whose ownership rests with its members. The purpose of Secure Chorus is to develop a secure interoperable cross-platform multimedia communications ecosystem suitable for government and industry use. read more more…DDoS attacks in Q1 2018
News overview In early January, it was reported that an amateur hacker had come close to pulling off a botnet attack using “improvised” materials. Armed with information gleaned from hacker forums, the DIYer created a Trojan using a zero-day exploit in Huawei routers and released it online. The attack was soon nipped in the bud, […] more…Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates. The age-old tradition isn’t just exclusive to teens, however, as cybercriminals still use the tactic modern day. Only their intentions are a bit more malicious than your average middle schooler. In fact, just this week, […] more…More information
- Rocket Kitten Spies Target Iranian Lecturer and InfoSec Researchers in New Modus
- Grambling Grad Getting Louisiana’s 1st Cybersecurity Degree
- VMware Working on Patches for Critical Workspace ONE Access Vulnerability
- Cambridge Analytica Could Also Access Private Facebook Messages
- What F-Secure learned from phishing 80,000 people
- US judges say FISA court privacy advocate may be counterproductive
- Analyzing C/C++ Runtime Library Code Tampering in Software Supply Chain Attacks
- Adobe backs down, will secure last generation of apps
- PCI 3.2 Compliant Organizations Are Likely GDPR Compliant
- What’s Up with Your Mobile Apps? Identifying and Mitigating Digital Risk