- Ransomware (3)
- Cybercrime (2)
- Internet Safety (6)
- Best Practices (5)
- Downloading (2)
- Apps (7)
- Passwords (4)
- Identity Theft (2)
- Financial Aid (4)
- Spyware (3)
- Facebook (8)
- Social Media (4)
- Apple (6)
- Online Shopping (4)
- Amazon (2)
- Privacy (12)
- Phishing (4)
- MFA (3)
- LastPass (6)
- Wi-Fi Networks (1)
- Malware (1)
- Security Awareness (1)
- Cybersecurity Careers (1)
- Breach (3)
- Spoofing (3)
- Fraud Prevention (3)
- Keylogging (3)
- Personal Identifiable Information (4)
While trying to give his all to a high-profile defense case, Dan chooses to cut a few corners regarding the firm’s IT Security procedures. The result places his entire career at stake when hackers find a way to gain his exact login credentials. This episode focuses on increasing awareness around keystroke loggers and what hackers can do with them.Ninjio Season 3: Episode 11 - Data Loss by the Logger
By Telstra IN:SIGHT.com
The security of personal information submitted online is a hot-button issue. We investigate how generation Y approaches privacy.
Millennials are a driving force in today’s digital marketplace. They’re shopping online while scrolling through their emails for deals and discounts. They like and share products across all social media channels. And they’re filling out forms and submitting orders at the tap of a fingertip or click of a mouse, entrusting their contact and payment information to just about any company.
By Catharine Hamm | latimes.com | 03 December, 2018
You may find an evil twin out there — not your own but one that still can do great harm. That nasty double often awaits you at your airport, ready to attack when you least expect it. That’s just one of the findings in a report that assesses the vulnerability of airport Wi-Fi, done not to bust the airports’ chops, but to make airports and travelers aware of the problems they could encounter.
Of the 45 airports reviewed, the report by Coronet said, two we might use could pose a special risk: San Diego and Orange County’s John Wayne, which rated No. 1 and No. 2, respectively, on the “Top 10 Most Vulnerable Airports.”
By Proofpoint Staff | proofpoint.com
As with most major events and trends, threat actors capitalize on Western holidays to craft lures and scams to trick users into clicking, installing malware, transferring funds, and otherwise acting on behalf of cybercriminals. Whether receiving email fraud messages asking users to purchase fake gift cards or using credit cards at terminals compromised with malware, the holidays present a variety of threats for businesses and consumers alike.
In particular, Proofpoint researchers have observed upticks in business email compromise (BEC) scams related to gift cards, holiday-themed lures in malicious emails, “Black Friday” shopping lures, and fluctuations in point-of-sale malware traffic.
By Violet Blue | PCWorld.com
Common as dirt, recording every move you make.
The American television series Mr. Robot introduces its viewers to a lot of hacking attacks, techniques, and tools. Most of it is based on actual methods and hardware, even if it is presented as far easier to do on the show than in real life. One thing the show portrays as a common, almost pedestrian attack technique is keylogging.
You need to know about keylogging, because it really is as common, easy to do, and critical to the success of criminals as it is on the TV show. That’s because the targets of attacks that involve keylogging are, well, just about anyone and everyone. And you wouldn’t even know that it’s happening.
By Byron V. Acohido | threatpost.com
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Somewhat quietly over the past couple of years there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems. Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. Last week, SureID, a fingerprint services vendor based in Portland, Ore., announced a partnership with Robbie. AI, a Boston-based developer of a facial recognition system designed to be widely deployed on low-end cameras.
By Gillian Cleary | Senior Software Engineer | Symantec
Just how much personal information are your apps gathering? And do they really need so much?
The average smartphone user these days has between 60 and 90 apps on their device. Most of these apps request some sort of information about you and the device you are using. They may want to know your name, your email address, or your real-world address. But because smartphones are so powerful, they can also get quite a bit more than that, such as your exact location. Some apps will even request access to the device’s camera or microphone.
By Gennie Gebhart | SecurityEducationCampaign.org
Keeping up with Facebook privacy scandals is basically a full-time job these days. Two weeks ago, it announced a massive breach with scant details. Then, this past Friday, Facebook released more information, revising earlier estimates about the number of affected users and outlining exactly what types of user data were accessed. Here are the key details you need to know, as well as recommendations about what to do if your account was affected.
By Russell Schrader, Executive Director, NCSA | StaySafeOnline
Cybersecuirty professionals touch the lives of each and every one of us—they play a critical role on the front lines of protecting our nation’s economy, from securing our financial information to making sire our quality of life is not jeopardized. Yet the nation faces a looming cybersecurity workforse crises – by 2021, an estimated 3. Million cybersecurity jobs will go unfilled.
October is National Cybersecurity Awareness Month (NCSAM) and 2018 marks NCSAM’s 15th year! Once again, UCLA is a Cyber Champion among higher educational institutions nationwide that are participating in NCSAM campaigns to raise cyber awareness within their campus communities and to encourage everyone to protect their computers, mobile devices, networks, data, and private information.
10 min | Tory Singer | Easy Read
Passwords are the gate keepers to our online accounts and identities. The keys to our data. And man, are there a lot of them! They aren’t too different from the physical keys we use to get into our house and our car. Except there are a lot of passwords. Like, a lot, a lot. About 23 on average per person to be exact, according to McAfee’s World Survey. Imagine having 23 physical keys. Sure, I know what you’re probably thinking: “Having 23 keys would be dope. I’d have a key for my Lambo, my beach house, my...”. But seriously how would we keep track of all of those keys and where they go?