- Ransomware (3)
- Cybercrime (2)
- Internet Safety (4)
- Best Practices (3)
- Downloading (2)
- Apps (7)
- Passwords (4)
- Identity Theft (2)
- Financial Aid (4)
- Spyware (3)
- Facebook (8)
- Social Media (4)
- Apple (6)
- Online Shopping (2)
- Amazon (2)
- Privacy (10)
- Phishing (2)
- MFA (3)
- LastPass (6)
- Wi-Fi Networks (1)
- Malware (1)
- Security Awareness (1)
- Cybersecurity Careers (1)
- Breach (3)
- Spoofing (3)
- Fraud Prevention (3)
In this Episode, we learn how a major corporation’s Twitter account was hacked, sending offensive tweets to customers and driving sales way down. Weak passwords were to blame. But not to worry, the lesson here shows users how to use a passphrase instead of a password to create something unique and complex for each site. It also encourages users to use 2-Factor Authentication for added security, requiring something to be in their possession (like a phone) in addition to the passphrase.NINJIO Season 2: Episode 6 - My Password is Password
By Byron V. Acohido | threatpost.com
Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Somewhat quietly over the past couple of years there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems. Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. Last week, SureID, a fingerprint services vendor based in Portland, Ore., announced a partnership with Robbie. AI, a Boston-based developer of a facial recognition system designed to be widely deployed on low-end cameras.
By Gillian Cleary | Senior Software Engineer | Symantec
Just how much personal information are your apps gathering? And do they really need so much?
The average smartphone user these days has between 60 and 90 apps on their device. Most of these apps request some sort of information about you and the device you are using. They may want to know your name, your email address, or your real-world address. But because smartphones are so powerful, they can also get quite a bit more than that, such as your exact location. Some apps will even request access to the device’s camera or microphone.
By Gennie Gebhart | SecurityEducationCampaign.org
Keeping up with Facebook privacy scandals is basically a full-time job these days. Two weeks ago, it announced a massive breach with scant details. Then, this past Friday, Facebook released more information, revising earlier estimates about the number of affected users and outlining exactly what types of user data were accessed. Here are the key details you need to know, as well as recommendations about what to do if your account was affected.
By Russell Schrader, Executive Director, NCSA | StaySafeOnline
Cybersecuirty professionals touch the lives of each and every one of us—they play a critical role on the front lines of protecting our nation’s economy, from securing our financial information to making sire our quality of life is not jeopardized. Yet the nation faces a looming cybersecurity workforse crises – by 2021, an estimated 3. Million cybersecurity jobs will go unfilled.
October is National Cybersecurity Awareness Month (NCSAM) and 2018 marks NCSAM’s 15th year! Once again, UCLA is a Cyber Champion among higher educational institutions nationwide that are participating in NCSAM campaigns to raise cyber awareness within their campus communities and to encourage everyone to protect their computers, mobile devices, networks, data, and private information.
10 min | Tory Singer | Easy Read
Passwords are the gate keepers to our online accounts and identities. The keys to our data. And man, are there a lot of them! They aren’t too different from the physical keys we use to get into our house and our car. Except there are a lot of passwords. Like, a lot, a lot. About 23 on average per person to be exact, according to McAfee’s World Survey. Imagine having 23 physical keys. Sure, I know what you’re probably thinking: “Having 23 keys would be dope. I’d have a key for my Lambo, my beach house, my...”. But seriously how would we keep track of all of those keys and where they go?
In this episode, a submarine commander faces a potentially deadly attack. It seems that an enemy obtained confidential data about the submarine’s sensors; the contractor responsible needs to track down what happened and make some changes, fast. Watch and learn how small, portable, and inexpensive devices might be used to gain access to your data.
By Lee Mathews Contributor Security | Forbes
Earlier this year several media outlets reported that Facebook sneakily encouraged users to download a VPN called Onavo for security reasons. VPNs redirect a user’s internet traffic through a third-party server which blocks everyone including the user’s ISP from seeing what the user is doing online. What Facebook didn’t make very clear was they that own Onavo, the third-party servers are Facebook’s, and the company uses the data feed to track the apps people are using. In other words, Onavo is basically a Facebook spyware program.