Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…What’s New in the World of Ransomware?
Ransomware, the type of malware that can infect your computers and devices, lock you out of your own files, and demand a ransom to unlock them, is growing rapidly in both incidents and sophistication. In some cases, ransomware is even used as a cover to distract from more serious attacks, so it’s important for everyone […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…IoT Devices: The Gift that Keeps on Giving… to Hackers
McAfee Advanced Threat Research on Most Hackable Gifts You’ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these “Internet-of-Things” (IoT) devices is expected to reach 600 million units this year[1] and, unfortunately, […] more…Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub
You’re a jerk. You’re a fat pig. You’re disgusting. It’s hard to imagine seeing these words written about anyone, but it happens every minute online. But hopefully, Instagram users will be noticing a kinder vibe thanks to the platform’s decision to automatically delete hateful, bullying comments. Instagram, the third most popular social network with 700 […] more…Running from Ransomware: A Mobile User’s Guide
From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy lunches, conquer the stack of unwashed dishes in the sink from the night before, and make sure that everyone is out the door on time. […] more…Helping Kids Understand the Foolishness and Consequences of Sexting
Sexting and teens. Nearly every week, the headlines reflect the attempt of citizens, educators, and lawmakers to tackle the question: What should the punishment be for teens caught sexting? In most states, officials may prosecute anyone, regardless of age, who creates, distributes or possesses an image of a minor engaged in sexual acts under that state’s […] more…Teaching Kids to Rise Above the Twitter Trolls
The social media platform Twitter has been making the headlines every day lately and not for good reasons. The popular 140-character driven network is under fire for its increasingly troll-heavy content and its failure to regulate abusive tweeters. From celebrities shutting down accounts to politicians and special interest groups daily (and very publically) engaged in […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Shoring up Tor: Researchers mount successful attacks against popular anonymity network — and show how to prevent them
With 2.5 million daily users, the Tor network is the world’s most popular system for protecting Internet users’ anonymity. Researchers have now demonstrated a vulnerability in Tor’s design. They show that an adversary could infer a hidden server’s location, or the source of the information reaching a given Tor user, by analyzing the traffic patterns […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…Smart Apps to Keep Your Teen from Texting and Driving
If you are like most parents, the “no texting and driving” comment is a daily exchange before your teen heads out the door, car keys in hand. A 2012 U.S. National Highway Traffic Safety Administration (NHTSA) survey found that drivers 18 to 20 showed the highest level of mobile phone involvement in crashes or near-crashes. […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…7 Tips to Help Merchants Build Trust and Increase Sales
When it comes to eCommerce, there are many factors that determine the success of your business. Each and every aspect of your website must be built with the customer in mind. Building trust is one of those factors, and one of the greatest challenges for online retailers looking to reduce shopping cart abandonment, regardless of […] more…More information
- The House Passed the Bill That Could Ban TikTok—and It Wasn’t Close
- Mēris Botnet Flexes Muscles With 22 Million RPS DDoS Attack
- 3 low-tech threats that lead to high-profile breaches
- 5 Facebook facepalms (just last week)
- U.S. Charges 7 Russian Intel Officers as West Condemns GRU
- CISO Conversations: Zoom, Thycotic CISOs Discuss the CISO Career Path
- US Charges Swiss ‘Hacktivist’ for Data Theft and Leaks
- Epic in hot water over Steam-scraping code
- Hackers Exploit Flaw in Squarespace Migration to Hijack Domains
- FUD Crypters Recycling Old Malware