3 Countries You Probably Haven’t Considered Volunteering Abroad In…
Volunteering abroad is an excellent idea for spreading your wings, whilst helping others less fortunate than you in the process. There are so many opportunities for volunteering abroad in nowadays. Sure, everyone likes going to places like India to volunteer in. But, have you considered these 3 countries? 1. Volunteer in Cameroon… Cameroon is a […] more…Teenage WikiLeaks volunteer: Why I served as an FBI informant
A young Icelandic boy’s journey as an informant all began with a cryptic e-mail sent to the United States Embassy in Reykjavík from Sigurdur “Siggi” Thordarson (Sigurður Ingi Þórðarsson), then an 18-year-old. Thordarson had been involved with WikiLeaks during the previous 18 months, moving ever-closer to the inner circle of the group—Julian Assange eventually promoted […] more…Big China Spy Balloon Moving East Over US, Pentagon Says
The Pentagon said at midday Friday that a Chinese spy balloon had moved eastward and was over the central United States, and that the U.S. rejected China’s claims that it was not being used for surveillance. Brig. Gen. Pat Ryder, Pentagon press secretary, refused to provide details on exactly where the balloon was or whether […] more…US Charges 8 People Over Cybercrime, Tax Fraud Scheme
The United States Department of Justice this week announced charges against eight individuals for their participation in a racketeering (RICO) conspiracy that involved hacking and tax fraud. read more more…Guide: Protecting Your Digital Identity
People in their 20s and 30s are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest form, your digital identity is made up of a whole host of things that can be traced back to you and who you are. That can range anywhere from photos you post online to online shopping accounts, email accounts to telephone numbers, […] more…Can My Phone Be Tracked If Location Services Are Off?
Your smartphone comes with built-in location services, which are useful if you lose it or if you use an app that needs to know your location. But what if you don’t want your phone to be tracked? Can the phone be located if you turn off location services? The answer is yes, it’s possible to […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day upon us, it’s time to have “The Talk.” The internet talk, that is. What’s the internet talk? It’s a candid conversation about how safe we’re really being when we go online, as opposed to how […] more…Parents: You May Want to Pay Closer Attention to the TikTok App
You aren’t imagining things. Everyone is talking about the popular video-sharing app TikTok. That’s because it has simultaneously become both a source of entertainment for kids as well as a source of concern for some adults. The social network, owned by Chinese parent company ByteDance, recently reached 750 million downloads, pushing its popularity ahead of […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
We uncovered a recent activity involving the notorious online credit card skimming attack known as Magecart. The attack, facilitated by a new cybercrime group, impacted 201 online campus stores in the United States and Canada. We started detecting the attacks against multiple campus store websites on April 14, during which the sites were injected with […] more…How the Trend to Conduct Psychometric Tests for Hiring/Promotion Has Started
There are different trends out there that are making a great impact on the business world. You can see the industry getting revolutionised through different latest strategies and methods. You can find tests that are specially used by the recruiters to ensure that the business is growing at a rapid pace. Certainly the steering at […] more…Perspectives On Securing Our Election Systems
I had the pleasure of sitting on a panel at CyberScoop’s CyberTalks event this week, which coincides this year with the RSA 2018 Conference in San Francisco. Our discussion focused on the need to protect election systems from would-be hackers seeking to change results, sow discord in our election processes, and undermine confidence in our […] more…Ready for a Love Affair with Your Job?
Five Questions to Ask Yourself this Valentine’s Day This week, people around the world are exchanging cards, heart-shaped candy or flowers with loved ones to celebrate Valentine’s Day. This holiday centers on seeking happiness in relationships and finding love, but just as important, is how we find happiness in our careers and passion for the […] more…More information
- White House Unveils New Efforts to Guide Federal Research of AI
- smtp.psu.edu and webmail.psu.edu maintenance – July 25
- Cryptographic system lets users control access to their data
- Resolved: Altoona Campus
- NIST taking input for mobile security guidelines
- Northern Virginia School System Hacked, Data Held for Ransom
- Georgia Extradites Russian Data Theft Suspect to US
- Google Patches Dangerous Vulnerabilities in Chrome 57
- Microsoft Manually Patched Office Component: Researchers
- Reverse String WooCommerce WordPress Credit Card Swiper