Date Night #FromHome Ideas
Date Night #FromHome ideas “So, what movie should we watch?” The dreaded question. Twenty minutes of “mmm, maybe” later, you settle on an old episode of “The Office” and call it good. If that sounds a little too familiar, this post is for you. With so many of us having date night at home, now […] more…Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations
No One is Invisible to Ransomware Attacks: Cybercriminals Pinpointing Healthcare Organizations In this challenging time, cybercriminals have their eyes on consumers and institutions alike. Malicious groups have increased their targeting of hospitals and healthcare entities to take advantage of deepening resource strain. Many of these groups are using ransomware attacks to compromise hospital systems, locking up patient records or vaccine research until a […] more…Stay Ahead of Misinformation – 5 Ways to Combat Fake News
Stay ahead of misinformation – 5 ways to combat fake news Finding information in this increasingly digital world has never been easier. Our mobile phones dictate top headlines before we even get out of bed, and even our routers can perform complex searches via voice. We see the impact of this easy access on both our consumption and the sharing of information. Just as it’s easy for us to perform a quick search and send the relevant results to our social groups, it’s also simple for bad actors to create and […] more…Online shopping scams – 7 ways to fight them
Be wary of online shopping scams – 7 ways to fight them While some of us may be quite skilled at finding miscellaneous gadgets and great deals on apparel online, relying on e–commerce platforms for all of our basic household needs is a new challenge. Many of us preferred to shop at brick and mortar retail for certain purchases such as groceries or pharmaceuticals. Now that we’ve turned online for all our shopping needs, online […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years by trying to get other people interested in you.” ~ Dale Carnegie Each year it’s my tradition to re-read a handful of books that continue to shape my perspective. One of those books is the […] more…KBOT: sometimes they come back
Although by force of habit many still refer to any malware as a virus, this once extremely common class of threats is gradually becoming a thing of the past. However, there are some interesting exceptions to this trend: we recently discovered malware that spread through injecting malicious code into Windows executable files; in other words, […] more…The Top Technology Takeaways From CES 2020
Another Consumer Electronics Show (CES) has come and gone. Every year, this trade show joins practically everyone in the consumer electronics industry to show off the latest and greatest cutting-edge innovations in technology. From bendable tablets to 8k TVs and futuristic cars inspired by the movie “Avatar,” CES 2020 did not disappoint. Here are a […] more…Less is More: 5 Ways to Jumpstart a ‘Digital Minimalist’ Mindset
Editor’s Note: This is part II of a series on Digital Minimalism in 2020. Is this the year you rethink and rebuild your relationship with technology? If so, embracing digital minimalism may be the most powerful way to achieve that goal. We learned last week in our first post on this series tht digital minimalism […] more…Digital Minimalism: Is It Time to Overhaul Your Relationship with Technology?
Editor’s Note: This is part I of a series on Digital Minimalism in 2020. When Steve Jobs introduced the iPhone in 2007, he called it the “best iPod ever,” and said it would be a “very cool way” to make calls and listen to music. Little did he know that it would be the catalyst […] more…Parents: You May Want to Pay Closer Attention to the TikTok App
You aren’t imagining things. Everyone is talking about the popular video-sharing app TikTok. That’s because it has simultaneously become both a source of entertainment for kids as well as a source of concern for some adults. The social network, owned by Chinese parent company ByteDance, recently reached 750 million downloads, pushing its popularity ahead of […] more…Snake bites: Beware malicious Python libraries
Earlier this week, two Python libraries containing malicious code were removed from the Python Package Index (PyPI), Python’s official repository for third-party packages. It’s the latest incarnation of a problem faced by many modern software development communities, raising an important question for all developers who rely on open source software: How can you make it possible […] more…Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files. A sum of money, or ransom, is then demanded in return for access to […] more…FIN6 Compromised E-commerce Platform via Magecart to Inject Credit Card Skimmers Into Thousands of Online Shops
We discovered that the online credit card skimming attack known as Magecart or E-Skimming was actively operating on 3,126 online shops. Our data shows that the attack started on September 7, 2019. All of the impacted online shops are hosted on the cloud platform of the e-commerce service provider “Volusion,” one of the top e-commerce […] more…The Seven Main Phishing Lures of Cybercriminals
One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online (AOL) every day. And if we know one thing about cybercriminals, it’s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to […] more…Assessing the impact of protection from web miners
Brief summary: We present the results of evaluating the positive economic and environmental impact of blocking web miners with Kaspersky products. The total power saving can be calculated with known accuracy using the formula <w>·N, where <w> is the average value of the increase in power consumption of the user device during web mining, and […] more…More information
- My Favourite Online Games For Under 10’s
- XcodeGhost Compiler Malware Targets iOS, OS X Systems
- Online applications for Office 365 are slow
- Should employees be punished for sloppy cyber security? [POLL]
- New in Windows security: Automatically log off suspicious users
- Cracking passwords from the Philips hack – an important lesson
- Operation Pawn Storm: The Red in SEDNIT
- Spotify offers playlists tailored to your DNA
- From the Labs: New developments in Microsoft Office malware
- It’s the End of Google Search As We Know It