10 Questions to Ask Yourself Before Snapping and Posting that Photo
Let’s face it. Photos do the talking for most of us today. Everyone is snapping, chatting, posting, and engrossed in choosing the perfect photo filter. But what if, while steeped in capturing our lives in images, we were being rude, insensitive, or even breaking the law? With so many posts, there’s bound to be some […] more…Mark your calendar for the net neutrality Day of Action
Tomorrow – July 12 – is the Internet-Wide Day of Action, with big online names from Kickstarter and Vimeo to Reddit and Spotify banding together to express their objection to overturning rules that guarantee net neutrality more…Spam Campaign Delivers Cross-platform Remote Access Trojan Adwind
Cybercriminals are opportunists. As other operating systems (OS) are more widely used, they, too, would diversify their targets, tools, and techniques in order to cash in on more victims. That’s the value proposition of malware that can adapt and cross over different platforms. And when combined with a business model that can commercially peddle this […] more…LeakerLocker: Mobile Ransomware Acts Without Encryption
We recently found on Google Play a type of mobile ransomware that does not encrypt files. This malware extorts a payment to prevent the attacker from spreading a victim’s private information. LeakerLocker claims to have made an unauthorized backup of a phone’s sensitive information that could be leaked to a user’s contacts unless it receives […] more…10 Tips To Stay Safe Online
With hacks, scams, malware and more, the Internet can feel like a dangerous place these days. And, the recent proliferation of devices, from smartphones and tablets to Internet-connected appliances, has opened us up to even greater risks. But the good news is that by taking just a small handful of security measures we can greatly […] more…Russia Targeted Election-Related Networks in 21 States: DHS
Hackers believed to be working for the Russian government targeted election-related networks in 21 U.S. states, representatives of the Department of Homeland Security (DHS) told the Senate Intelligence Committee on Wednesday in a hearing on threats to election infrastructure. read more more…The #1 Skill All Parents Should Be Homeschooling Kids in This Summer
Dear Mr. and Mrs. Smith, your child’s decision to post inappropriate content online is why we’ve decided to rescind our previous invitation to attend Harvard University. Can you imagine getting an email or a phone call to that effect? Hopes and dreams dashed because of a careless, crude, or unwise online conversation a very bright kid assumed would be […] more…Is That Photo Containing a Cyberthreat? What to Know About Steganographic Malware
Secret messages are hidden everywhere – within a hit song, a brand logo, a big blockbuster movie. Usually, these messages are fun Easter eggs or nods to fans. In the digital world, this kind of practice is called steganography, and messages are usually concealed in images, audio tracks, video clips, or text files. But, instead […] more…‘McAfee Labs Threats Report’ Explores Malware Evasion Techniques, Digital Steganography, Password-Stealer Fareit
We got a little carried away in the McAfee Labs Threats Report: June 2017, published today. This quarter’s report has expanded to a rather hefty 83 pages! It contains three highly educational topics, in addition to the usual set of threats statistics: We broadly examine evasion techniques and how malware authors use them to accomplish […] more…Se préparer au RGPD en 2017 – Quatrième partie : votre SOC
Cet article de blog est le quatrième d’une série dont le but est d’aider les dirigeants d’entreprise et les cadres responsables de la sécurité à se préparer au RGPD tout au long de l’année 2017. L’une des exigences fondamentales du nouveau règlement général sur la protection des données (RGPD) est la notification des violations de […] more…Unplugging: How Small Tech Shifts Can Make a Big Impact on a Family Vacation
The smartphone is the one item that automatically ignites an inner struggle as we pack for that long-awaited family vacation. On the one hand, we know we’d be trailblazers destined for an unforgettable family vacation if we “accidentally” left our phone on the bed and took off. On the other hand, that little glowing device […] more…Public-private partnership critical to thwarting cyber threats
While a set of more than 100 recommendations to help increase cybersecurity across the healthcare industry might seem like overkill, the co-chair of a task force that developed them believes the challenges are urgent and wide-ranging, requiring immediate and aggressive action. “There are so many areas that need to be addressed, quite frankly, given the […] more…Employee at Trios Health snoops on data of 600 patients
An employee at Trios Health, which is anchored by Trios Southridge Hospital in Washington State, was using its electronic health record system not just to perform job duties but to also look up information on patients outside of the employee’s job function. The incident is the latest in a spate of breaches at healthcare organizations […] more…ICIT Calls for Legislation to Enforce Encryption on Government Agencies
The starting point for a new study from the Institute for Critical Infrastructure Technology is not new: “There are only two types of networks, those that have been compromised and those that are compromised without the operator’s awareness.” Since it is impossible to defend the network, the solution is surely to defend the data. Here […] more…The Reigning King of IP Camera Botnets and its Challengers
By Kenney Lu, Tim Yeh and Dove Chiu (Threats Analysts) Early this month we discussed a new Internet of Things (IoT) botnet called Persirai (detected by Trend Micro as ELF_PERSIRAI.A), which targets over 1000 Internet Protocol (IP) camera models. Currently, through Shodan and our own research, we see that 64% of tracked IP cameras with […] more…Helping Kids Understand the Foolishness and Consequences of Sexting
Sexting and teens. Nearly every week, the headlines reflect the attempt of citizens, educators, and lawmakers to tackle the question: What should the punishment be for teens caught sexting? In most states, officials may prosecute anyone, regardless of age, who creates, distributes or possesses an image of a minor engaged in sexual acts under that state’s […] more…More information
- CYE Raises $100 Million to Help Minimize Attack Surfaces
- "File thingie" ~ Deface & Shell Upload vulnerability
- Australian customs seizes fake iPhones that deliver a shock
- Cybersecurity M&A Roundup for February 1-15, 2022
- Splunk to Acquire Threat Intelligence Platform Provider TruSTAR
- Reddit to crack down on online harassment
- Internet Explorer zero-day exploit found on more websites. Fingers point towards Elderwood Project
- Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently
- Two Popular VPNs Exposed Users to Attacks Via Fake Updates
- Recently Patched GE Cimplicity Vulnerabilities Reminiscent of Russian ICS Attacks