How to Steer Clear of Tax Season Scams
It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of […] more…Researchers reveal methods behind car hack at Defcon
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other important functions. read more more…How NASA steers the International Space Station around space junk
Orbiting about 250 miles (400-ish km) above our heads is one of the most complex and expensive engineering projects that the human race has ever put together: the International Space Station (ISS). The station masses around 450 tons (400 metric tons) and is a bit larger than an American football field. Tags: NASA Industry News more…Helping Mom & Dad: Online Banking
Editor’s Note: This is the first in a series of articles about how we can help our elder parents get the most out of digital life—the ways we can help them look after their finances and health online, along with how they can use the internet to keep connected with friends and family, all safely […] more…Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…Saving Summer: 5 Strategies to Help Reign In Family Screen Time Over Break
It’s the most wonderful time of the year — for teachers and lifeguards. For everyone else (parents) we have a little prep work to do to make sure the summer doesn’t lull our kids into digital comas. Most of us have learned that given zero limits, kids will play video games, watch YouTube, send snaps, […] more…Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
We uncovered a recent activity involving the notorious online credit card skimming attack known as Magecart. The attack, facilitated by a new cybercrime group, impacted 201 online campus stores in the United States and Canada. We started detecting the attacks against multiple campus store websites on April 14, during which the sites were injected with […] more…New Magecart Attack Delivered Through Compromised Advertising Supply Chain
by Chaoying Liu and Joseph C. Chen On January 1, we detected a significant increase in activity from one of the web skimmer groups we’ve been tracking. During this time, we found their malicious skimming code (detected by Trend Micro as JS_OBFUS.C.) loaded on 277 e-commerce websites providing ticketing, touring, and flight booking services as […] more…Transforming Students into Professionals to Close the Skills Gap: A Million Dollar Investment
Innovation. It’s at the core of any security breakthrough. Just ask an expert in the crowd gathered at MPOWER, McAfee’s Annual Security Summit. And if you ask me, as McAfee’s SVP and chief human resource officer, innovation is not just how our industry can defend against the growing number of cyberthreats, but also how we […] more…Global Community Service Day 2018: Together for good
By: Emily, Communications Program Manager When I finished college, I went to work for the same nonprofit youth sports organization where I tried volleyball, basketball and other sports growing up. The keyword is ‘try,’ because, let’s face it – I was bad at sports. All coaches for the organization were – and still are – […] more…Brief wireless service disruption
On Friday, 3-23, during the standard EIT maintenance window there will be a brief wireless service disruption for the following buildings. OakBldg BiomechanicsLab Burrowes Carpenter Cedar Chambers EisenhowerChapel Ford Forum Ihlseng Keller Kern Mateer Moore Music MusicII NittanyDepot NittanyLionInn Oswald Paterno Pattee Pond Rackley RecHall Schultz Theater Waring 103Bldg 230BLDG 328Bldg 329Bldg 330Bldg 331BLDG ADL […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information. When utilized effectively they help maintain the organization’s efficiency, so holding these mission-critical files […] more…More information
- Medical centre staff post woman’s STD diagnosis on Facebook
- Microsoft: Update Java or kill it
- Hacker Releases Source Code of IoT Malware Mirai
- Sci-fi author sues Ubisoft over Assassin’s Creed copyright infringement
- Hacker nabs Yahoo! site backups
- Microsoft says "No!" to insecure certificate practices
- How confidential are your calls? This iPhone app shared them with everyone
- Resolved: eLion transcript menu unavailable
- 12 Days competition: Day 5 – This software left the keys but threw away the lock
- Update: Penn State Beaver: Unplanned power disruption