Cyberawareness in Australia: The good and the bad

An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online Australia is a highly interconnected country with nine in ten inhabitants being internet users, most of which use the internet every day. What do they know about cybersecurity and how do they approach it, though? A recent survey

How to better protect your organization’s most valuable data

Making Sense of Security

Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Keeping up with cybercriminals can be a never-ending challenge for organizations and security professionals. As hackers and attackers come up with increasingly more clever and devious ways to infiltrate an organization, your critical and sensitive data becomes more

An Identity Management Spin on Shaggy’s Hit Song

Wondering how this guy could be so clumsy? So is he. [youtube https://www.youtube.com/watch?v=5uVuW7VhIsA] Source: Emirates NBD What security-related videos have made you laugh? Let us know! Send them to [email protected]. Beyond the Edge content is curated by Dark Reading editors and created by external sources, credited for their work. View Full Bio View Original Article HERE

Ambitious scam wants far more than just PayPal logins

An ongoing phishing scam uncovered by ESET researchers seeks to wreak havoc on your money and digital life in one fell swoop ESET researchers in Latin America have spotted fraudulent websites that impersonate PayPal and attempt to trick users into handing over considerably more than ‘only’ their access credentials to the payment service. The ruse

Vulnerability Scanning vs. Penetration Testing

It amazes me how many people confuse the importance of vulnerability scanning with penetration testing. Vulnerability scanning cannot replace the importance of penetration testing, and penetration testing, on its own, cannot secure the entire network. Both are important at their respective levels, needed in cyber risk analysis, and are required by standards such as PCI,

How to secure your digital Christmas presents

What are some of the key things you should do with your shiny new device as soon as you unbox it? It’s that time of year again, and chances are that new tech will be one of the gifts tucked under your Christmas tree. Whether it’s a smartphone, laptop or, say, an Internet-of-Things (IoT) gadget,

The five: ransomware attacks

Cyber-attacks that threaten to publish a victim’s data or block access to it unless a ransom is paid have grown internationally since 2012. Sodinokibi and Travelex Hackers attacked Travelex’s network on New Year’s Eve, stealing customer data including dates of birth, credit card information, and national insurance numbers. The ransomware gang responsible, Sodinokibi, has demanded

FBI, This Week: Holiday Scams

When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind: If it sounds too good to be true, it probably is. Audio Transcript Mollie Halpern: When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind…  James Harris, Jr: If it sounds too

How to get rid of your old devices safely

Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures Black Friday, Cyber Monday and even Christmas are behind us. Which means some of us may have been fortunate enough to unwrap a shiny new laptop, smartphone or tablet. But what about our

20 tips for 2020: Mistakes to avoid

In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid

20 tips for 2020: Be smarter with your smartphone

In the second blogpost of this two-part series we’ll suggest handy tips to help enhance the security of your mobile devices Yesterday, we discussed bad cybersecurity habits you should avoid in 2020, especially where computers are involved. We’re not done yet. Some of the recommendations apply to both computers and smartphones, such as being especially

Discovering Careers in Cybersecurity

We were excited to celebrate National Cybersecurity Career Awareness Week (NCCAW), November 11-16, 2019. Technology and cybersecurity play a vital role in many facets of our lives. Our growing dependence on the internet and the convenience of technology comes with unique challenges. Attackers are constantly trying to steal sensitive data and cripple systems, such as

3 security tips to protect yourself from skimming attacks

E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice. TechRepublic’s Karen Roby talks with Aanand Krishnan, founder and CEO of Tala Security, about protecting consumers’ identity while shopping online. The following is an edited transcript of their

Get yourself cybersecure for 2020

Technology is changing our lives for the better; yet it’s also exposing us to organised crime, online scammers and hackers – and whole industries built around monetising our personal data. But you don’t have to be resigned to cyber-victimhood. Give yourself, and your devices, a security update for 2020 and start fighting back. Random and

Visa Warns About Hackers Stealing Gas Pumps Credit Card Data

Payment processing company Visa reported that attackers at gas pumps intercept credit card data from point-of-sale networks, which are becoming increasingly attractive targets for such cybercrime organizations due to their lack of safe recognition software. Visa said its Payment Fraud Disruption or PFD teams detected three separate threats targeting point-of-sale retailer or POS networks expected

NSA congratulates Centers of Academic Excellence (CAE)

FORT MEADE, Md., Dec. 13, 2019 — The following academic institutions were recognized as designated or re-designated CAE schools at the November 2019 NICE conference: Air Force Institute of Technology Arapahoe Community College Auburn University Baker College Bluegrass Community and Technical College Brookdale Community College Butler Community College Century College Coastline Community College Columbus State

FTC Obtains Record $191 Million Settlement from University of Phoenix to Resolve FTC Charges It Used Deceptive Advertising to Attract Prospective Students

The University of Phoenix (UOP) and its parent company, Apollo Education Group, will settle for a record $191 million to resolve Federal Trade Commission charges that they used deceptive advertisements that falsely touted their relationships and job opportunities with companies such as AT&T, Yahoo!, Microsoft, Twitter, and The American Red Cross. Under the settlement unanimously

Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum

South Korean cryptocurrency exchange Upbit today said hackers could steal $49 million in Ethereum. On 27 November, the crypto-coins were moved from Upbeat Ethereum Hot Wallet to an unknown wallet, announced Doo-myeon’s CEO Lee Seok-woo who operates Upbit. In a publication on the Upbit website, the hackers, Seokwoo, disclosed 342,000 ETH (Ethereum), equivalent to approximately

5 scams to watch out for this shopping season

Black Friday and Cyber Monday are just around the corner and scammers are gearing up to flood you with bogus offers According to Adobe, consumers in the US are predicted to spend a staggering US$143.7 billion this shopping holiday season. Unsurprisingly, smartphones are expected to account for a significant part of the purchases made. Shopping

Do NOT Answer Your Phone!

Follow my blog with Bloglovin That’s right! We said do NOT answer your phone! There have been way too many issues lately of innocent yet unknowledgeable people getting scammed out out their hard earned money. The first thing to know with your phone is to NOT answer the phone if you DO NOT KNOW who

SCAM ALERT-SSA

Follow my blog with Bloglovin SCAM ALERT SOCIAL SECURITY ADMINISTRATION CALLING SCAM DO NOT ANSWER The Social Security Administration recently announced that the public is being scammed with threats to cancel individual’s social security numbers. The victims are being told that they have “committed a fraud” and they are told to pay the SSA money

Welcome to Making Sense of Security

Making Sense of Security

Follow my blog with Bloglovin Welcome to Making Sense of Security. Technology is evolving at a rapid speed. There is much advancement at the stroke of a key. Making sense of what functions best for one may not be for another. Keeping up with advancements to be able to maintain functions is vital. We are

New FBI Wanted App

The FBI has launched a free new mobile app to enlist the public’s help in locating and identifying wanted fugitives, missing persons, and others sought by the Bureau. You’re watching your local news on TV when you see a story on a wanted fugitive in your community. The person looks like someone you’ve seen living

FBI Releases New Bank Robbers Mobile App

The FBI launched a mobile version of its Bank Robbers website to make it easier for smartphone users to view photos and information about bank robberies. Back in December 2012, the FBI launched its Bank Robbers website featuring a gallery of unknown bank robbery suspects wanted by the Bureau. Because the FBI, in its own

Protecting Our Children with Technology and Partnerships

Essentially, CETS is a repository that can be filled with records pertaining to child pornography and child exploitation cases. The system can contain images, case information, identities of known offenders along with information about their Internet addresses, and other related material. The program can analyze millions of pornographic images, helping law enforcement personnel avoid duplication

New Tools to Find FBI’s Most Wanted

Not all FBI fugitives are included in the Most Wanted section. Many bank robbers, for example, are publicized through local Bureau press releases or through various state or local websites. See our Bank Robbery webpage for a list of those sites and additional information. Early on, our fugitive posters were commonplace in federal buildings, most