Spam and phishing in Q3 2021
Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1 Grand Prix races. There was no way that cybercriminals and profiteers could […] more…Great R packages for data import, wrangling, and visualization
The table below shows my favorite go-to R packages for data import, wrangling, visualization and analysis — plus a few miscellaneous tasks tossed in. The package names in the table are clickable if you want more information. To find out more about a package once you’ve installed it, type help(package = "packagename") in your R […] more…Financial Cyberthreats in 2020
2020 was challenging for everyone: companies, regulators, individuals. Due to the limitations imposed by the epidemiological situation, particular categories of users and businesses were increasingly targeted by cybercriminals. While we were adjusting to remote work and the rest of the new conditions, so were scammers. As a result, 2020 was extremely eventful in terms of digital […] more…Internet Safety Begins with All of Us
Internet Safety Begins with All of Us Now’s the time to pause for a moment and consider just how important the internet is to us. Not just any internet. A safer internet. June marks Internet Safety Month. Why June? The original thought was that the onset of summer sees more kids online, making it an […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded in return for access to […] more…Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
It’s mind-blowing to think that when you become a parent, you have just 18 summers with your child before he or she steps out of the mini-van and into adulthood. So at the mid-summer point, it’s a great time to ask: How balanced is your child’s screen time? Don’t panic, it’s normal for screen time […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Being Secure In The Most Connected World Cup Ever
Sporting events are getting more and more connected, and the just-concluded World Cup is no exception. Brazilian telecom provider Oi made sure that no expense was spared in ‘connecting’ the World Cup , and even claimed that this year’s event is in fact the most connected in the history of the World Cup. Oi claims that they […] more…More information
- Microsoft Paid $2,000,000 in Bounty Rewards in 2018
- Spend Less, Test Faster: Choosing the Right Security Tools
- There’s no best way to handle disclosure of zero-day vulnerabilities
- LastPass scrambles to fix another major flaw – once again spotted by Google’s bugfinders
- Microsoft Windows Transport Layer Security CVE-2019-1318 Spoofing Vulnerability
- Many Drupal Sites Still Vulnerable to Drupalgeddon2 Attacks
- Samsung acquires Apple Pay competitor LoopPay
- Removing your laptop and liquids at airport security may soon be a thing of the past
- Microsoft Edge and Internet Explorer CVE-2019-0762 Security Bypass Vulnerability
- The CFO’s role in the cloud question