Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis
Last month, some of the usual cast of online scammers and malware miscreants promised to refrain from attacking healthcare organizations or exploiting them during the COVID-19 crisis, showing a sense of honor unexpected from ransomware attackers and cryptocurrency thieves. However, this ceasefire turned out to be a head-fake. Within a week of those vows, malware […] more…How to Steer Your Security Organization in a Toxic Environment
Five Ways to Steer Your Security Organization in a Toxic Environment read more more…Adware program Vonteera blocks security products with simple Windows UAC trick
A well-known adware program is preventing users from installing antivirus products by leveraging a Windows feature that was designed for security. The program, known as Vonteera, abuses the digital signature check performed by the Windows User Access Control (UAC) for executable files. UAC prompts users for confirmation whenever a program wants to make a system change […] more…Doing more with less: Steering a quantum path to improved internet security
New research may lead to greatly improved security of information transfer over the internet. Physicists have demonstrated the potential for ‘quantum steering’ to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices. more…IBM to acquire endpoint security company Trusteer
IBM has signed an agreement to acquire security company Trusteer, and plans to set up a cybersecurity software lab in Israel. read more more…Application Security Protection for the Masses
I’ve always found it entertaining that so many sales pitches are essentially a listing of features for the product or service being sold. The reason I find this entertaining is that for anyone who has worked on the customer side or has ever listened to customers, it is obvious that customers buy solutions, not products. […] more…Steer Clear of the “Pay Yourself Scam” That’s Targeting Online Bank Accounts
An old banking scam has a new look. And it’s making the rounds again. Recently Bank of America alerted its customers of the “Pay Yourself Scam,” where scammers use phony fraud alerts and trick their victims into giving them access to their online banking accounts. It’s a form of phishing attack, and according to Bank […] more…Here’s How to Steer Clear of Bot Accounts on Social Media
“Congratulations, you’re a winner!” “Did you know this public figure is trying to make your life worse? Click here for what they don’t want you to know.” “Save thousands today with just one click!” Spam and bot accounts on social media are everywhere. You’ve likely encountered messages like these that attempt to get you to […] more…The IRS “Dirty Dozen” – Top Tax Season Scams to Steer Clear of This Year
Who loves tax season besides accountants? Scammers. Emotions can run high during tax time. Even if you’re pretty sure you did everything right, you may still have a few doubts kicking around. Did I file correctly? Did I claim the right deductions? Will I get audited? As it turns out, these are the very same […] more…Younger, But Not Savvier: 3 Cybersecurity Threats Plaguing Millennials
Surprise! Just because you’re a Millennial or Gen Zer doesn’t mean you’re savvier when it comes to technology. Especially when it comes to cybersecurity. Turns out, Millennials aren’t quite as tight with their security as the older generations are. That’s according to one study about working from home that focused on younger adults and their older cohorts. It’s perhaps no surprise that nearly half of them said that […] more…3 Tips to a Holistic Online Security Approach
Cybersecurity is often used as a blanket term to address online safety. Cybersecurity can refer to the software used to protect your devices, but it can also refer to the processes you put in place to protect yourself from online threats. Whether you’re implementing best practices, building awareness of security threats, or installing security software, taking a holistic approach to online […] more…WFH security lessons from the pandemic
A year ago, IT and cybersecurity teams faced a number of challenges — constantly emerging threats, data privacy regulations, and a significant and widening skills gap, to name a few. Then things really got difficult. Tech Spotlight: Security 4 ways to keep the cybersecurity conversation going after the crisis (CSO) Mitigating the hidden risks of […] more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…How To Help Your Kids Manage Our ‘Culture of Likes’
As a mum of 4 sons, my biggest concerns about the era of social media is the impact of the ‘like culture’ on our children’s mental health. The need to generate likes online has become a biological compulsion for many teens and let’s be honest – adults too! The rush of dopamine that surges through […] more…How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The first few weeks back to school can be some of the most exciting yet turbulent times of the year for middle and high schoolers. So as brains and smartphones shift into overdrive, a parent’s ability […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…More information
- FBI: we don’t want a backdoor; we just want you to break encryption
- Firefox beats Chrome and Tor in our trustworthy browser poll
- Adobe Password Security Criticised by Experts
- Facebook slapped by FTC for failing to meet security promises
- ALPACA: New TLS Attack Allows User Data Extraction, Code Execution
- Monday review – the hot 15 stories of the week
- Symantec’s Veritas sale price slashed by $1 billion
- Information-stealing ‘Vawtrak’ malware evolves, becomes more evasive
- FCC: robocalls can go get BLOCKED
- Microsoft Internet Explorer CVE-2013-3199 Memory Corruption Vulnerability