Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more more…Code.org volunteer emails exposed in information leak
As a result, a Singaporean firm decided to try and poach a few members. more…Code.org Hacked, Emails and Locations Data of Volunteers Compromised 33
An anonymous reader allegedly quoting an email from Code.org, claims that the database of the non-profit organization has been breached: Tags: Security more…Don’t Take the Bait! How to Steer Clear of Tax Time Scams
For cybercriminals tax time is the most wonderful time of the year. They are in the shadows giddy, eager, and methodically setting a variety of digital traps knowing that enough taxpayers take the bait to render their efforts worthwhile. Indeed, with the frenzy of online tax filings, personal information (and money) moving through mailboxes, and […] more…Tor Project says it can quickly catch spying code
The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote on Monday. There are worries that Tor could either be technically subverted or subject to court orders, which could force the project to turn over […] more…Source code for powerful Android banking malware is leaked
The source code for a powerful Android malware program that steals online banking credentials has been leaked, according to researchers with IBM. The malware family is known by several names, including GM Bot, Slempo, Bankosy, Acecard, Slempo and MazarBot. GM Bot has been sold on underground hacking forums for around US$500. But it appears someone […] more…How Safe is Your Android Pin Code? A New Robot Can Easily Break In
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually […] more…A better reason not to use Huawei routers: Code from the ’90s
Security researcher Felix "FX" Lindner has a more compelling reason to steer clear of routers from Huawei Technologies than fears about its ownership. read more Incoming search termsTeer celog more…The Big Reason Why You Should Update Your Browser (and How to Do It)
The humble internet browser. Dutifully taking you the places you want to go online, whether that’s the bank, the store, the movies, or even to work. All the more reason to make sure your browser gets every last bit of protection it can. It’s easy to fire up your browser without a second thought. Arguably, […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…Fraudulent Apps that Automatically Charge you Money Spotted in Google Play
Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much freedom to developers and hardware manufacturers to make quality devices at reasonable prices. The number of Android phones in the world is astounding. That success comes with a price, however. A recent report from our own […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Online Banking—Simple Steps to Protect Yourself from Bank Fraud
Online Banking—Simple Steps to Protect Yourself from Bank Fraud Even if you’re not big on online banking, online banking is big on you. Online banking is well on its way to becoming a cornerstone of the banking experience overall. More and more transactions occur over the internet rather than at a teller’s window, and nearly […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…More information
- Hackers hit energy companies more than others
- Trojanized Android games hide malicious code inside images
- Judge recommends dismissal of Ceglia’s ownership lawsuit against Facebook
- eBay suffers major outage but is yet to acknowledge it
- Millions more adult and dating website accounts for sale on dark web
- 16-year-old Canadian boy arrested for over 30 swattings, bomb threats
- More Details Emerge on Operations, Members of Chinese Group APT41
- News of Beastie Boy Adam Yauch’s Death Leads to Malware
- Fighting Fraud With Threat Intelligence: Debunking Common Misconceptions
- Four eCommerce Must Haves for Holiday Success