How to Help Kids Steer Clear of Digital Drama this School Year
Editor’s note: This is Part II of helping kids manage digital risks this new school year. Read Part I. The first few weeks back to school can be some of the most exciting yet turbulent times of the year for middle and high schoolers. So as brains and smartphones shift into overdrive, a parent’s ability […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…Civilians steer NASA satellite from an old McDonald’s
I hadn’t been aware that, if you ask NASA nicely, you’ll be allowed to take the controls of a satellite floating in outer space. Clearly, I need to get out more, as this is what a group of very interested civilians are doing from their headquarters in a McDonald’s. Let’s be fair, it’s an old […] more…Teenage WikiLeaks volunteer: Why I served as an FBI informant
A young Icelandic boy’s journey as an informant all began with a cryptic e-mail sent to the United States Embassy in Reykjavík from Sigurdur “Siggi” Thordarson (Sigurður Ingi Þórðarsson), then an 18-year-old. Thordarson had been involved with WikiLeaks during the previous 18 months, moving ever-closer to the inner circle of the group—Julian Assange eventually promoted […] more…All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you find the quickest and best possible path to recovery. Ransomware coverage from McAfee can reimburse you up to $25,0000 for losses resulting from a ransomware threat, including financial losses and ransom fees. You’ll find this […] more…Beware of Social Media Scams
Social media is a great place to connect with friends and family. Unfortunately, it is also a great place for misinformation to run rampant, and it is a virtual treasure chest for cybercriminals to steal personal information. Over 25 million Canadians own a social media account, and more than 80% of the Canadian population is […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Entertainment #FromHome: How to start your own podcast
How to start your own podcast Start your own podcast? Why not? Instead of streaming someone else’s show, maybe it’s time to create one of your own. And a fine time to start a podcast it is. Podcasting once took a bit of effort to get into. The recording software, the hosting, and the equipment […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple iPhone vulnerabilities using websites to infect final targets. The key concept behind this type of attack is the use of trusted websites as an intermediate platform to attack others, and it’s defined as a watering hole […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…More information
- ftp.personal.psu.edu partial outage
- Seriously folks, you should know that Facebook warning about a virus *burning* your hard disk is bunk
- FaceTime bug, eavesdropping and digital snooping – what to do? [VIDEO]
- 110+ Sprüche über die Familie
- British spies are allowed to intercept Google and Facebook traffic, official says
- Facebook, WhatsApp Both Put Under Notice by Europe
- Microsoft Internet Explorer CVE-2013-3145 Memory Corruption Vulnerability
- The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
- Resolved: Scheduled iTwo Outage for 7/20/2013 (Sat) 7am-12pm
- Instead of news, UK paper delivered ransomware