Beware of Back-To-School Scams
These days it seems that there is a scam for every season, and back-to-school is no different. From phony financial aid, to debt scams, and phishing emails designed to steal your identity information, there are a lot of threats to study up on. Of course, many of these scams are just different twists on the […] more…Expanding Our Vision to Expand the Cybersecurity Workforce
I recently had the opportunity to testify before Congress on how the United States can grow and diversify the cyber talent pipeline. It’s great that members of Congress have this issue on their radar, but at the same time, it’s concerning that we’re still having these discussions. A recent (ISC) Study puts the global cybersecurity […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…How To Sidestep Popular Social Scams
Each year, internet users lose billions of dollars to online scams, using clever ploys to trick us out of our information and money. By offering prizes, referencing current events, or just creating a sense of urgency, scammers know how to get us to click when we really shouldn’t. Check out these recent scams, so you […] more…Transforming Students into Professionals to Close the Skills Gap: A Million Dollar Investment
Innovation. It’s at the core of any security breakthrough. Just ask an expert in the crowd gathered at MPOWER, McAfee’s Annual Security Summit. And if you ask me, as McAfee’s SVP and chief human resource officer, innovation is not just how our industry can defend against the growing number of cyberthreats, but also how we […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Streamin’ in the Sun – Your Essential Checklist for Safely Watching this Summer’s Biggest Events Online
With several major European sporting events, music festivals and a huge royal wedding on the way, this summer is set to be filled with many must-see moments. For those occasions where a television isn’t close by or the content is not freely available, many of us may resort to streaming services so that we can […] more…What’s New in the World of Ransomware?
Ransomware, the type of malware that can infect your computers and devices, lock you out of your own files, and demand a ransom to unlock them, is growing rapidly in both incidents and sophistication. In some cases, ransomware is even used as a cover to distract from more serious attacks, so it’s important for everyone […] more…Ready for a Love Affair with Your Job?
Five Questions to Ask Yourself this Valentine’s Day This week, people around the world are exchanging cards, heart-shaped candy or flowers with loved ones to celebrate Valentine’s Day. This holiday centers on seeking happiness in relationships and finding love, but just as important, is how we find happiness in our careers and passion for the […] more…McAfee Applauds “Cyber Scholarship Opportunities Act of 2017”
By Lisa Depew, Head of Industry and Academic Outreach, McAfee The “Cyber Scholarship Opportunities Act of 2017,” which is sponsored by Sens. Roger Wicker (R-Miss.) and Tim Kaine (D-Va.) and was recently approved by the Senate Commerce, Science and Transportation Committee, is welcome news for those increasingly worried about the cybersecurity workforce shortage. A report […] more…Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub
You’re a jerk. You’re a fat pig. You’re disgusting. It’s hard to imagine seeing these words written about anyone, but it happens every minute online. But hopefully, Instagram users will be noticing a kinder vibe thanks to the platform’s decision to automatically delete hateful, bullying comments. Instagram, the third most popular social network with 700 […] more…Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for the delivery of ransomware is the use of the Nullsoft Scriptable Install System (NSIS) with an encrypted payload. The list of the most common families using this technique is diverse and includes Cerber, Locky, Teerac, Crysis, […] more…What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five years ago. I’ve had to. Technology has dramatically changed all of us in that short time. Still, at least once a month a parent asks me, “How much should I really be snooping on my […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…Got privacy? If you use Twitter or a smartphone, maybe not so much
The notion of online privacy has been greatly diminished in recent years, and just this week two new studies confirm what to many minds is already a dismal picture. First, a study reported on Monday by Stanford University found that smartphone metadata — information about calls and text messages, such as time and length — can […] more…Traffic Studies Reveal Complex Picture of Tor’s Role on ‘Dark Web’
For a week in March, Website security firm CloudFlare analyzed the traffic hitting its customers’ sites from the anonymous Tor Network. The results of the study illustrate the double-edged nature of online anonymity. The Tor Network—a peer-to-peer collection of volunteered servers linked together to create an anonymizing Web service—allows people in oppressive countries to surf […] more…More information
- Google says government surveillance keeps rising
- Oracle PeopleSoft Enterprise HCM Human Resources CVE-2019-2951 Remote Security Vulnerability
- Virtual Event Today: Supply Chain Security Summit & Expo
- FCC: Google approved about StreetView Wi-Fi snooping, covered up the truth
- Twitter users delt malicious links via direct messages
- Apache Cordova fixes flaw that could cause apps to crash
- FBI issues warning about using hotel Internet connections
- Ping Identity rolls mobile one-swipe authentication; takes aim at RSA tokens
- Tips on where to start in managing risk
- Ask Sucuri: How Do You Find Website Backdoors?