Send Your Kids Back to School with Cybersecurity Knowledge
Summer vacation is on and chances are that your kids are spending time indoors as the scorching sun makes it too hot to go and play outside. They are probably lounging around with their devices, which may include gaming devices, smartphones, laptops, desktops, virtual assistants, livestreaming sticks, smart toys or e-book readers. And why not? […] more…3 Ways to Strengthen Your Family Bond this Summer (Without Ditching Your Devices)
My parents recently went through a health crisis that required me to travel to be with them for several weeks. During that time, I started using FaceTime on my iPhone to daily connect with my teenage daughter back home. Until this life event, I wasn’t one to video chat. However, the live video technology of […] more…DDoS attacks in Q1 2018
News overview In early January, it was reported that an amateur hacker had come close to pulling off a botnet attack using “improvised” materials. Armed with information gleaned from hacker forums, the DIYer created a Trojan using a zero-day exploit in Huawei routers and released it online. The attack was soon nipped in the bud, […] more…Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese Consulate Staff
Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates. The age-old tradition isn’t just exclusive to teens, however, as cybercriminals still use the tactic modern day. Only their intentions are a bit more malicious than your average middle schooler. In fact, just this week, […] more…Is scraping files from a Freedom of Information website ‘hacking’?
A teen is being charged for downloading 7k records, 250 of which weren’t properly redacted. Who’s to blame? more…Change is Good When It’s Free, Easy, and Has a Happy Endpoint
When a company announces a new version of something I rely upon in my personal life, like Apple announcing a new iPhone, I cringe. Of course, the thought of the latest and best is exciting, but the thought of upgrading – the cost, the hassle – usually makes me wait (longer than my teenage son would like). […] more…The Malicious Use of Artificial Intelligence in Cybersecurity
Criminals and Nation-state Actors Will Use Machine Learning Capabilities to Increase the Speed and Accuracy of Attacks Scientists from leading universities, including Stanford and Yale in the U.S. and Oxford and Cambridge in the UK, together with civil society organizations and a representation from the cybersecurity industry, last month published an important paper titled, The […] more…Don’t Get Duped: How to Spot 2018’s Top Tax Scams
It’s the most vulnerable time of the year. Tax time is when cyber criminals pull out their best scams and manage to swindle consumers — smart consumers — out of millions of dollars. According to the Internal Revenue Service (IRS), crooks are getting creative and putting new twists on old scams using email, phishing and malware, […] more…You Can DDoS an Organization for Just $10 per Hour: Cybercrime Report
The cost of having an organization targeted by a distributed denial of service (DDoS) attack for an hour is as low as $10, cybersecurity firm Armor says. The low cost of launching such attacks results from the proliferation of cybercrime-as-a-service, one of the most profitable business models adopted by cybercriminals over the past years. It […] more…18.5 Million Websites Infected With Malware at Any Time
There are more than 1.86 billion websites on the internet. Around 1% of these — something like 18,500,000 — are infected with malware at a given time each week; while the average website is attacked 44 times every day. Sitelock has published its Q4 2017 Website Security Insider analysis of malware and websites based on […] more…Cheat Codes to Digital Parenting
As digital immigrants, I have seen a lot of my friends in a constant dilemma/struggle about bringing up children in this digital age. I understand, there aren’t any rule books that can be used as a guide or any previous experience to fall back upon. Consequently, there arises digital conflicts between parents and kids ranging […] more…Can’t Keep Up? 6 Easy Things You Can Do to Keep Your Kids Safe Online
Having a hard time doing what needs to be done to keep your kids safe online? Do you mentally shrink back when you realize you don’t do any of the tips experts so often recommend? Let the guilt go, parent because you are not alone. Family life moves at warp speed. We want to keep […] more…6 Tips to Help Protect and Improve Your Child’s Online Reputation
Not the better choice. Take it down, please. That’s the short, efficient text message I’ve sent more times than I can count over the years while monitoring and coaching my kids’ online content choices. My daughter is now a senior in high school with her eyes fixed on college. And while she can take credit […] more…The global cyber war is heating up: Why businesses should be worried
Last Friday, the Department of Justice indicted 13 Russians and three Russian companies for interfering with the 2016 elections. Also last week, several countries including the U.S., the U.K., Canada, Australia, and Denmark accused Russia of being behind last summer’s NotPetya attack. [ How much does a cyber attack really cost? Take a look at […] more…Could You Have a Toxic Relationship with Your Smartphone?
It’s the elephant in the room no one wants to talk about: our devotion to and dependence on our smartphones. For most of us, our children included, smartphones have become an appendage; a limb of voracious digital consumption and social obligation that keeps us scrolling, refreshing, swiping, and responding with no end in sight. Any friend […] more…U.S. Announces Takedown of Global Cyber Theft Ring
The US Justice Department announced indictments Wednesday for 36 people accused of running a transnational ring stealing and selling credit card and personal identity data, causing $530 million in losses. Thirteen members of the “Infraud Organization” were arrested in the United States, Australia, Britain, France, Italy, Kosovo and Serbia, it said. read more more…More information
- Tenable to Acquire Cloud Security Firm Ermetic for $240 Million
- Spanish MSSP Targeted by BitPaymer Ransomware
- Gozi Banking Trojan Campaigns Target Global Brands
- Flash: Click to Play
- Microsoft Windows Remote Desktop Protocol CVE-2016-0036 Local Privilege Escalation Vulnerability
- AdultFriendFinder’s hacked database available for download
- PAWS, Workflow, and PDF Generator Certificate Update – June 25
- Oracle Java SE/Java SE Embedded CVE-2019-2973 Remote Security Vulnerability
- Authentication, identity management start-ups lead 2019 VC investing
- Google Paid Out $12 Million via Bug Bounty Programs in 2024