Teenage WikiLeaks volunteer: Why I served as an FBI informant
A young Icelandic boy’s journey as an informant all began with a cryptic e-mail sent to the United States Embassy in Reykjavík from Sigurdur “Siggi” Thordarson (Sigurður Ingi Þórðarsson), then an 18-year-old. Thordarson had been involved with WikiLeaks during the previous 18 months, moving ever-closer to the inner circle of the group—Julian Assange eventually promoted […] more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…How to Steer Your Security Organization in a Toxic Environment
Five Ways to Steer Your Security Organization in a Toxic Environment read more more…Researchers Hijack Jeep’s Steering, Brakes, Acceleration
Charlie Miller and Chris Valasek, the researchers who last year showed that cars can be remotely hijacked, are back with a new demonstration, and this time they managed to take over a vehicle’s acceleration, brakes and steering. read more more…Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Code.org volunteer emails exposed in information leak
As a result, a Singaporean firm decided to try and poach a few members. more…Free iPad 3 Scams Steer Users to Bad Sites
Scammers have snatched up the opportunity to victimize people by leveraging the interest and anticipation over the upcoming release of iPad 3. Just days before its supposed launch, we have noted several posts on Facebook that claim to give away free iPad 3s to some “lucky” users. Unlike previous Facebook threats we’ve blogged recently, this […] more…The 5 big events that shaped Microsoft’s 2025
This has been a pivotal 12 months for Microsoft, a year in which it faced increasing competition that threatened to knock the company off its perch as the world’s leader in AI. Even so, Microsoft managed to add about $400 billion to its valuation this year, pushing it to about $3.5 trillion, depending on the […] more…The AI-powered cyberattack era is here
Prognosticators have been prognosticating for 20 years about a future in which hackers use AI to breach networks, steal data, and socially engineer credulous employees. And like so many AI-related futurisms in the age of LLM-based generative AI, this prediction is coming true. Anthropic reported last week that a hacker used its technology for an […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with a look at several quick ways you can quickly get safer online. Now in its 21st year, Cybersecurity Awareness Month marks a long-standing collaboration between the U.S. government and private industry. It’s aim, empower people […] more…How to Protect Your Social Media Accounts
Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you […] more…How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…Seniors: How to Keep Your Retirement Safe from Online Scams
The growing number of internet crimes targeting senior adults is mind-blowing. In 2021, more than 92,000 people over the age of 60 reported losses of $1.7 billion, according to IC3, the FBI’s Internet Crime division. That number reflects a 74 percent increase in losses from 2020. These numbers tell us a few things. They tell […] more…Helping Mom & Dad: Family Video Chats
Editor’s Note: This is the third in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…Google Vows to Stop Tracking Individual Browsing for Ads
Google on Wednesday pledged to steer clear of tracking individual online activity when it begins implementing a new system for targeting ads without the use of so-called “cookies.” read more more…More information
- Don’t like Russian cyberspies? Tips to stop state-sponsored hackers
- What’s in the latest Firefox upgrade? Native support for Apple’s M1 Macs
- Skype instant messaging in China is censored, spied upon
- Revolutionary New "Anti-Fishing" Technology
- ZeroFox to Acquire Threat Intelligence Firm LookingGlass for $26 Million
- Facebook outage coincides with (or causes?) 3m new Telegram users
- Operation Black Atlas Continues to Compromise PoS Systems
- Risk management: Anticipate, evaluate, prioritize
- Anatomy of a phish – how to spot a Man-in-the-Middle attack, and other security tips
- How to make workers happier with less pay