Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!” “Did you know this public figure is trying to make your life worse? Click here for what they don’t want you to know.” “Save thousands today with just one click!” Spam and bot accounts on social media are everywhere. You’ve likely encountered messages like these that attempt to get you to […] more…Foreign tech workers are avoiding travel to the US
I go to a lot of tech conferences — 13 in 2025 — and many of those I attend are outside the US; several are in London, one is in Amsterdam, another in Paris, and two in Tokyo. Wherever I went this past year, when we weren’t talking about AI, Linux, the cloud, or open-source […] more…The AI-powered cyberattack era is here
Prognosticators have been prognosticating for 20 years about a future in which hackers use AI to breach networks, steal data, and socially engineer credulous employees. And like so many AI-related futurisms in the age of LLM-based generative AI, this prediction is coming true. Anthropic reported last week that a hacker used its technology for an […] more…Start the New Year Right With This 3-Step Digital Detox
Pledging to follow healthier habits is consistently the most popular new year’s resolution. That January 1st promise looks different to everyone: snacking less often, going to the gym more often, drinking more water, drinking less soda, etc. This year, instead of a juice cleanse subscription, opt for a healthier habit that’s not an unappetizing shade […] more…Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too. Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with […] more…Seniors: How to Keep Your Retirement Safe from Online Scams
The growing number of internet crimes targeting senior adults is mind-blowing. In 2021, more than 92,000 people over the age of 60 reported losses of $1.7 billion, according to IC3, the FBI’s Internet Crime division. That number reflects a 74 percent increase in losses from 2020. These numbers tell us a few things. They tell […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…Beware, the Curious Case of iPhone Spyware
The new iPhone spy app launched officially by the Apple Store ought to be turning quite a few heads at this point. The name of the app is enough to stop everyone in their tracks. ‘Stalker’ is now available for download and only costing a meager 99 cents, there is no reason that anyone should not be one. […] more…More information
- Maintenance: PASS and PASS based Web Hosting may be slow on 4/12 – 4/15
- The cryptominer that kept coming back
- Cybercrime kingpins are winning the online security arms race
- UK Set to Scale Back Huawei Role in 5G Network: Report
- 3D printing pirates: When eBay thieves profit from your work
- Chinese Crypto Bans on WeChat Accounts, Events, and Exchanges: What Happened and Why
- Patch Tuesday recap: This month, an ‘Ides of March’ update?
- Must-see talks from 2015’s Chaos Communication Congress hacker conference
- Microsoft .NET Framework Serialization CVE-2012-0162 Remote Code Execution Vulnerability
- iCloud security: How (and why) to enable two-factor authentication