What Interests Children Online
Today’s children and teenagers are integrated into cyberspace so tightly that discussions on the outright prohibition of using devices with Internet connectivity are nonsensical. It is more reasonable to teach children how to behave themselves correctly online and lend support by protecting them against undesirable content. To solve these problems, many parents use dedicated software […] more…Risk assessments for local governments and SMBs
Next week, I am scheduled for a semi-annual risk assessment with my dentist. He performs a very specific, highly focused type of risk assessment that is totally worth the $125 it will cost. In addition to performing specialized maintenance (hypersonic cleaning), he will provide a threat assessment (for oral cancer, cavities, periodontal disease and other […] more…A Rising Trend: How Attackers are Using LNK Files to Download Malware
PowerShell is a versatile command-line and shell scripting language from Microsoft that can integrate and interact with a wide array of technologies. It runs discreetly in the background, and can be used to obtain system information without an executable file. All told, it makes an attractive tool for threat actors. There were a few notable instances […] more…Protecting Your Privacy on Social Media
Social media sites are made for sharing, so protecting your privacy sometimes comes as an afterthought. But, the kind of information you share and whom you share it with can make a big difference between having a positive experience on social media, and putting your money and private details at risk. Sites like Facebook and […] more…6 Ways to ‘Just Say No’ to the Time Wasting Habit of Digital Digging
If an app existed that tracked the minutes we spent looking at other people’s social profiles online (much like a Fitbit that tracks physical steps), some of us might quietly slip into a state shock. Call it what you will — creeping, Facebook stalking, digital digging — it’s a habit that could be sucking up […] more…IT threat evolution Q1 2017. Statistics
Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…Your data has been kidnapped… now what?
What’s it like to be held hostage? I never want to find out and I’ll bet you don’t either. But given today’s environment executives might find themselves held hostage in a way they never expected. Ransomware, as it is known because it holds your entire computer system hostage, is quickly becoming the hacker’s method of choice […] more…Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our kid’s online activity? That’s the rhetorical question most parents carry around unspoken. With all the to-dos of parenting, isn’t there a shortcut on all that social media stuff we don’t have to bookmark or save […] more…WannaCry FAQ: What you need to know today
Friday May 12th marked the start of the dizzying madness that has been ‘WannaCry’, the largest ransomware infection in history. Defenders have been running around with their heads on fire trying to get ahead of the infection and to understand the malware’s capabilities. In the process, a lot of wires have gotten crossed and we […] more…Privacy Awareness Week 2017: It’s Time To Talk More To Your Kids
Attention, parents with kids between 8 and 17! Here’s a statistic that is probably going to make you squirm – apologies in advance. Conversations between Aussie parents and their kids about cyber safety have dropped an alarming 23% compared to previous years. Eeeekkk! This startling statistic is part of research conducted by McAfee and Life […] more…WannaCry ransomware used in widespread attacks all over the world
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This exploit (codenamed “EternalBlue”) has been […] more…Industry Reactions to Trump’s Cybersecurity Executive Order
U.S. President Donald Trump signed an executive order on Thursday in an effort to improve the protection of federal networks and critical infrastructure against cyberattacks. read more more…What Else Kids Give Away When They Share Passwords
Tweens and teens share clothes, secrets, and homework notes but there’s something else your kids may be sharing that isn’t so wise — their passwords. Password sharing has become a symbol of trust between friends and a sign of intimacy between significant others so much so that most teens aspire to password sharing as “relationship […] more…Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras
By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that caused some of the most […] more…Banks Face Challenge Of Integrating Cyber And Operational Risk
Banks are increasingly aware of the threats that can arise from cyber-related crimes and are continuing to strengthen their defenses against these threats. The resulting pace of change and innovation on both sides of the “conflict” continues to accelerate as the potential for gain and/or loss for the attacking entities and financial institutions only grows. Newly […] more…More information
- Apple’s iCloud saved deleted browser records, security company finds
- Multiple Cloud Foundry Products CVE-2019-11293 Information Disclosure Vulnerability
- SSCC 178 – Are we there yet? [PODCAST]
- Industry Reactions to Cybersecurity Workforce Executive Order
- Obama prepared to impose financial sanctions on China for alleged hacking
- Malicious Behavior Found in Advertising SDK Used by 1,200 iOS Apps
- Hackers turn their back on exploiting Java to focus on Flash flaws
- Patch Tuesday June 2013 – Office, Windows and Flash
- 7 ways hackers can use Wi-Fi against you
- Nearly 6,000 online stores hit by hackers