How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The first few weeks back to school can be some of the most exciting yet turbulent times of the year for middle and high schoolers. So as brains and smartphones shift into overdrive, a parent’s ability […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…Civilians steer NASA satellite from an old McDonald’s
I hadn’t been aware that, if you ask NASA nicely, you’ll be allowed to take the controls of a satellite floating in outer space. Clearly, I need to get out more, as this is what a group of very interested civilians are doing from their headquarters in a McDonald’s. Let’s be fair, it’s an old […] more…Teenage WikiLeaks volunteer: Why I served as an FBI informant
A young Icelandic boy’s journey as an informant all began with a cryptic e-mail sent to the United States Embassy in Reykjavík from Sigurdur “Siggi” Thordarson (Sigurður Ingi Þórðarsson), then an 18-year-old. Thordarson had been involved with WikiLeaks during the previous 18 months, moving ever-closer to the inner circle of the group—Julian Assange eventually promoted […] more…How IT leaders unlock productivity with Microsoft 365 Copilot
In environments ranging from construction sites to university campuses to legal and retail operations, IT leaders are putting generative AI assistants to work — and discovering how to make them drive productivity. In this article, we focus on Microsoft 365 Copilot, examining real-world experiences that reveal both the promise and the pitfalls of the AI […] more…All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you find the quickest and best possible path to recovery. Ransomware coverage from McAfee can reimburse you up to $25,0000 for losses resulting from a ransomware threat, including financial losses and ransom fees. You’ll find this […] more…Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…More information
- Trump mum on Russia blame after US intelligence briefing
- SpiderOak streamlines its enterprise secure-cloud pricing to $5 per user
- Iranian Hackers Caused Losses in Hundreds of Millions: Report
- Serious Flaws Found in ATMs of German Bank
- Monday review – the hot 32 stories of the week
- Microsoft Authentication Library CVE-2019-1487 Information Disclosure Vulnerability
- Hackers Leak Australian Health Records on Dark Web
- VDI: Non-virtual problems of virtual desktop security, and how to solve them for real
- Operation Onymous: 17-nation bust takes out over 400 "hidden services"
- This 22 course IT certification package is just $99 today