Teenage WikiLeaks volunteer: Why I served as an FBI informant
A young Icelandic boy’s journey as an informant all began with a cryptic e-mail sent to the United States Embassy in Reykjavík from Sigurdur “Siggi” Thordarson (Sigurður Ingi Þórðarsson), then an 18-year-old. Thordarson had been involved with WikiLeaks during the previous 18 months, moving ever-closer to the inner circle of the group—Julian Assange eventually promoted […] more…SD-WAN Product Vulnerabilities Allow Hackers to Steer Traffic, Shut Down Networks
Researchers at cybersecurity consulting firm Realmode Labs have identified vulnerabilities in SD-WAN products from Silver Peak, Cisco, Citrix and VMware, including potentially serious flaws that can be exploited to steer traffic or completely shut down an organization’s network. read more more…How to Steer Your Security Organization in a Toxic Environment
Five Ways to Steer Your Security Organization in a Toxic Environment read more more…Researchers Hijack Jeep’s Steering, Brakes, Acceleration
Charlie Miller and Chris Valasek, the researchers who last year showed that cars can be remotely hijacked, are back with a new demonstration, and this time they managed to take over a vehicle’s acceleration, brakes and steering. read more more…Code.org Flaw Exposes Volunteer Email Addresses
Code.org, a non-profit organization that helps students learn computer science, informed users over the weekend that a flaw on its website allowed unauthorized parties to access the email addresses of its volunteers. read more Incoming search termsteercot more…Code.org volunteer emails exposed in information leak
As a result, a Singaporean firm decided to try and poach a few members. more…Free iPad 3 Scams Steer Users to Bad Sites
Scammers have snatched up the opportunity to victimize people by leveraging the interest and anticipation over the upcoming release of iPad 3. Just days before its supposed launch, we have noted several posts on Facebook that claim to give away free iPad 3s to some “lucky” users. Unlike previous Facebook threats we’ve blogged recently, this […] more…Threat Hunting with VirusTotal
We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-the-wild examples of modern malware and infamous APT campaigns. In case you missed it, here you can find the video recording available on Brighttalk. We also created a PDF version of the […] more…See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with a look at several quick ways you can quickly get safer online. Now in its 21st year, Cybersecurity Awareness Month marks a long-standing collaboration between the U.S. government and private industry. It’s aim, empower people […] more…How to Protect Your Social Media Accounts
Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you […] more…How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…Seniors: How to Keep Your Retirement Safe from Online Scams
The growing number of internet crimes targeting senior adults is mind-blowing. In 2021, more than 92,000 people over the age of 60 reported losses of $1.7 billion, according to IC3, the FBI’s Internet Crime division. That number reflects a 74 percent increase in losses from 2020. These numbers tell us a few things. They tell […] more…Helping Mom & Dad: Family Video Chats
Editor’s Note: This is the third in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…Google Vows to Stop Tracking Individual Browsing for Ads
Google on Wednesday pledged to steer clear of tracking individual online activity when it begins implementing a new system for targeting ads without the use of so-called “cookies.” read more more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…VMware SD-WAN Vulnerabilities Expose Enterprise Networks to Attacks
VMware on Wednesday patched a total of six vulnerabilities in its SD-WAN Orchestrator product, including flaws that can be chained by an attacker to steer traffic or shut down an enterprise network. read more more…More information
- In memoriam – Alan Turing’s 100th birthday
- Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
- CyanogenMod Installer Application Removed from Play Store
- PoC Published for Critical Fortra Code Execution Vulnerability
- How to keep your Smart Home safe
- Indian APT Targeting Mediterranean Ports and Maritime Facilities
- Dump Trump! A Chrome extension to censor “The Donald” from the web
- Creating an Effective Threat Hunting Program with Limited Resources
- Flash Zero-Day Exploited in Targeted Attacks
- Fortinet Enhances Network Security OS, Adds AI-based Threat Detection