Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…6 Ways to Help Kids Steer Clear of Cyberbullies During Summer Break
Wouldn’t it be nice if kids could leave the veiled threats and cutting words behind when the bell rings for summer break? Unfortunately, bullies rarely take a break from intimidating others over the summer and may even step up their game. To date, nothing has humbled me quite like this parenting gig. Once upon a […] more…DARPA makes games of finding software vulnerabilities
The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work. Having gamers identify potentially problematic chunks of code could help lower the work load of trained […] more…Steam gamers targeted by cleartext-grabbing trojan
Steam gamers are targeted by a trojan that steals their login credentials and defeats the service’s password encryption mechanism by using HTML injection. Attackers stripping users’ login data with a variant of the trojan Ramnit since mid-July according to Trusteer fraud prevention solutions manager Etay Maor. Steam has some 54 million members and was victim […] more…22 tech luminaries we lost in 2025
As modern technologies such as artificial intelligence grab today’s headlines, it’s worth remembering that their foundations were being laid more than half a century ago by computer scientists, philosophers, psychologists, developers, entrepreneurs, and more. These pioneers and those who followed tackled issues and solved problems that future generations may never know existed — but without their […] more…Burned out by bots: The rise of prompt fatigue in the workplace
Generative artificial intelligence (genAI) tools have quickly become commonplace in the workplace. In the rush to boost productivity, many organizations have adopted them without fully considering how best to integrate them into daily workflows. Some employees are now complaining of “prompt fatigue” — a kind of cognitive drain similar to the “Zoom fatigue” of the […] more…Unwrapping Some of the Holiday Season’s Biggest Scams
Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some of their nastiest cons as people travel, donate to charities, and simply try to enjoy their time with friends and family. Unfortunate as it is, scammers see this time of year as a tremendous opportunity to profit. […] more…See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with a look at several quick ways you can quickly get safer online. Now in its 21st year, Cybersecurity Awareness Month marks a long-standing collaboration between the U.S. government and private industry. It’s aim, empower people […] more…All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you find the quickest and best possible path to recovery. Ransomware coverage from McAfee can reimburse you up to $25,0000 for losses resulting from a ransomware threat, including financial losses and ransom fees. You’ll find this […] more…Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too. Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with […] more…How to Quickly Remove Malware in 2022
If you’re like most people, you probably use your computer for most of your online activities. It’s amazing what the internet can do to make our lives easier. But if you’ve spent any time online, you know the internet also comes with some risks. Malware (or malicious software) is one risk of living a connected […] more…The Big Reason Why You Should Update Your Browser (and How to Do It)
The humble internet browser. Dutifully taking you the places you want to go online, whether that’s the bank, the store, the movies, or even to work. All the more reason to make sure your browser gets every last bit of protection it can. It’s easy to fire up your browser without a second thought. Arguably, […] more…Podcast: What’s next for the App Store?
This week, Apple said it paid developers $60 billion in 2021. That suggests that, last year, the App Store raked in more money than ever. Still, 2021 was not all roses for the App Store. In September, Apple’s lawsuit against Epic Games over in-app purchasing ended. While the judge ruled in favor of Apple most […] more…Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…How to Spot Fake Login Pages
Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals. Fake Login Pages Explained A fake login page is essentially a knock-off of […] more…More information
- SAP’s First Patches of 2024 Resolve Critical Vulnerabilities
- silent poison, bing based scanner [PHP]
- Ransomware Operators Show Reputable "Customer" Service
- Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms
- The BlackBerry KeyOne – a surprising phone with a hardware keyboard
- Huawei Planning Major Job Cuts in US: WSJ
- Iran implicated in DNS hijacking campaign around the world
- Israeli Spyware Firm Adopts ‘Human Rights Policy’
- Update: win.pass.psu.edu upgrade
- Obama fails to address NSA encryption-defeating methods, backdoors