California Bill Seeks to Adopt Strict Net Neutrality Despite FCC Ruling
As Americans wait to see whether net neutrality can gain enough support among lawmakers to invoke disapproval via the Congressional Review Act, individual states are not waiting — several are working on state laws to maintain net neutrality within their own borders. In December 2017, under the chairmanship of Ajit Pau, the FCC voted 3-2 […] more…What’s New in the World of Ransomware?
Ransomware, the type of malware that can infect your computers and devices, lock you out of your own files, and demand a ransom to unlock them, is growing rapidly in both incidents and sophistication. In some cases, ransomware is even used as a cover to distract from more serious attacks, so it’s important for everyone […] more…Hackers Tried to Cause Saudi Petrochemical Plant Blast: NYT
Cyber-attackers tried to trigger a deadly explosion at a petrochemical plant in Saudi Arabia in August and failed only because of a code glitch, The New York Times reported. Investigators declined to identify the suspected attackers, but people interviewed by the newspaper unanimously said that it most likely aimed to cause a blast that would […] more…U.S. Energy Firm Fined $2.7 Million Over Data Security Incident
An energy firm in the United States has been fined $2.7 million over a data security incident that resulted in the exposure of critical cyber assets. The North American Electric Reliability Corporation (NERC) revealed last month that an unnamed power company had agreed to pay the massive penalty and take action to avoid future leaks. […] more…Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in this digital age. I understand, there aren’t any rule books that can be used as a guide or any previous experience to fall back upon. Consequently, there arises digital conflicts between parents and kids ranging […] more…Blocking of Broadcom-Qualcomm Tie-up Highlights 5G Security Fears
The unusual move by President Donald Trump blocking a proposed takeover of Qualcomm by Singapore-based chip rival Broadcom highlights growing concerns about the rise of Chinese competitors in the telecom sector and related national security issues. Trump issued an order Monday barring the proposed $117 billion acquisition, citing credible evidence such a deal “threatens to […] more…Can’t Keep Up? 6 Easy Things You Can Do to Keep Your Kids Safe Online
Having a hard time doing what needs to be done to keep your kids safe online? Do you mentally shrink back when you realize you don’t do any of the tips experts so often recommend? Let the guilt go, parent because you are not alone. Family life moves at warp speed. We want to keep […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…McAfee Employees Share How They #PressForProgress on International Women’s Day
By Karla, Digital Media Specialist During the month of March, we’re excited to support International Women’s Day (March 8) and Women’s History Month. At McAfee, we recognize the power of an inclusive and diverse culture and are proud to celebrate the achievements of our trailblazing female colleagues worldwide. And of course, no group is more […] more…Insecure by design: What you need to know about defending critical infrastructure
Patching security vulnerabilities in industrial control systems (ICS) is useless in most cases and actively harmful in others, ICS security expert and former NSA analyst Robert M. Lee of Dragos told the US Senate in written testimony last Thursday. The “patch, patch, patch” mantra has become a blind tenet of faith in the IT security […] more…SEC’s new cybersecurity guidance falls short
The Securities and Exchange Commission (SEC) issued new guidance in February, urging senior executives and board members to pay closer attention to cybersecurity. However, the recommendations, while more stringent than what was in place before, don’t go far enough, critics say, and, more importantly, lack teeth. [ How much does a data breach cost? Here’s […] more…6 Tips to Help Protect and Improve Your Child’s Online Reputation
Not the better choice. Take it down, please. That’s the short, efficient text message I’ve sent more times than I can count over the years while monitoring and coaching my kids’ online content choices. My daughter is now a senior in high school with her eyes fixed on college. And while she can take credit […] more…Cyberattack ‘Ongoing’ Against German Government Network
The German government’s IT network is under an “ongoing” cyberattack”, the parliamentary committee on intelligence affairs said Thursday, without confirming a media report that Russian hackers were behind the assault. read more more…The global cyber war is heating up: Why businesses should be worried
Last Friday, the Department of Justice indicted 13 Russians and three Russian companies for interfering with the 2016 elections. Also last week, several countries including the U.S., the U.K., Canada, Australia, and Denmark accused Russia of being behind last summer’s NotPetya attack. [ How much does a cyber attack really cost? Take a look at […] more…5 ways blockchain is the new business collaboration tool
While blockchain may have cut its teeth on the cryptocurrency Bitcoin, the distributed electronic ledger technology is quickly making inroads across a variety of industries. That’s mainly because of its innate security and its potential for improving systems operations all while reducing costs and creating new revenue streams. David Schatsky, a managing director at consultancy Deloitte LLP, […] more…Could You Have a Toxic Relationship with Your Smartphone?
It’s the elephant in the room no one wants to talk about: our devotion to and dependence on our smartphones. For most of us, our children included, smartphones have become an appendage; a limb of voracious digital consumption and social obligation that keeps us scrolling, refreshing, swiping, and responding with no end in sight. Any friend […] more…More information
- Microsoft Jet Database Engine CVE-2018-8392 Buffer Overflow Vulnerability
- Obama orders chip-and-PIN in government credit cards
- Resolved: Scheduled Electrical Work
- IC3 urges social media users to beware: scams and fraud are surging
- Apple Says iPhones Will Get Security Updates for at Least 5 Years
- FCC: Telecom Firms Requested $5.6 Billion to Replace Chinese Gear
- In a bad mood? You might not be allowed to log on
- Narilam virus targets Middle East, but isn’t like others
- Cisco patches Equation group exploit in IOS, IOS XE and IOS XR devices
- Cisco Finds Serious Flaws in Policy Suite, SD-WAN Products