An ESET-commissioned survey sheds light on the browsing habits of Australians and how they protect themselves online Australia is a highly interconnected country with nine in ten inhabitants being internet users, most of which use the internet every day. What do they know about cybersecurity and how do they approach it, though? A recent survey
Apps are sharing more of your data with ad industry than you may think
by Lisa Vaas GDPR? The California Consumer Privacy Act (CCPA)? HA! Those laws aren’t doing squat to protect us from the digital marketing and adtech industry, according to a new report from the Norwegian Consumer Council (NCC). What chance do laws stand against policing what the NCC describes as a shadowy network of companies, “virtually
College students call for ban on facial recognition on campus
by Lisa Vaas US elementary and grade schools have been experimenting with facial recognition. But so far, it hasn’t been widely adopted at colleges – and students are taking part in a nationwide effort to keep it that way. On Tuesday, the digital rights group Fight for the Future announced that it’s teamed up with
2017 Data Breach Will Cost Equifax at Least $1.38 Billion
Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim. The final minimum tab for Equifax’s failure to patch
How to better protect your organization’s most valuable data
Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Keeping up with cybercriminals can be a never-ending challenge for organizations and security professionals. As hackers and attackers come up with increasingly more clever and devious ways to infiltrate an organization, your critical and sensitive data becomes more
An Identity Management Spin on Shaggy’s Hit Song
Wondering how this guy could be so clumsy? So is he. [youtube https://www.youtube.com/watch?v=5uVuW7VhIsA] Source: Emirates NBD What security-related videos have made you laugh? Let us know! Send them to [email protected]. Beyond the Edge content is curated by Dark Reading editors and created by external sources, credited for their work. View Full Bio View Original Article HERE
Ambitious scam wants far more than just PayPal logins
An ongoing phishing scam uncovered by ESET researchers seeks to wreak havoc on your money and digital life in one fell swoop ESET researchers in Latin America have spotted fraudulent websites that impersonate PayPal and attempt to trick users into handing over considerably more than ‘only’ their access credentials to the payment service. The ruse
Vulnerability Scanning vs. Penetration Testing
It amazes me how many people confuse the importance of vulnerability scanning with penetration testing. Vulnerability scanning cannot replace the importance of penetration testing, and penetration testing, on its own, cannot secure the entire network. Both are important at their respective levels, needed in cyber risk analysis, and are required by standards such as PCI,
FBI, This Week: Skimming Prevention Tips
All it can take is a swipe of your credit or debit card for your personally identifiable information to end up on the dark web. Audio Transcript Mollie Halpern: All it can take is a swipe of your credit or debit card for your personally identifiable information to end up on the dark web. It’s
How to secure your digital Christmas presents
What are some of the key things you should do with your shiny new device as soon as you unbox it? It’s that time of year again, and chances are that new tech will be one of the gifts tucked under your Christmas tree. Whether it’s a smartphone, laptop or, say, an Internet-of-Things (IoT) gadget,
The five: ransomware attacks
Cyber-attacks that threaten to publish a victim’s data or block access to it unless a ransom is paid have grown internationally since 2012. Sodinokibi and Travelex Hackers attacked Travelex’s network on New Year’s Eve, stealing customer data including dates of birth, credit card information, and national insurance numbers. The ransomware gang responsible, Sodinokibi, has demanded
Connected cars: How to improve their connection to cybersecurity
With software becoming more important than ever, how can engaging the security industry help make the road ahead less winding? Here at CES, the car manufacturers race to launch the latest gadgets in their new models before the competition. And that’s hard to do without breaking down the software silos. That would mean using widely
Malware in the Cloud: Protecting Yourself Based on Your Cloud Environment
In some ways, the cloud has made security management easier, as many cloud providers have taken the responsibilities traditionally associated with local server management out of your hands. But in other ways, the security management conversation has become more confusing for decision makers, as “cloud” is a very broadly defined term and could speak to
FBI, This Week: Holiday Scams
When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind: If it sounds too good to be true, it probably is. Audio Transcript Mollie Halpern: When looking for a good deal this holiday shopping season, the FBI suggests keeping this old adage in mind… James Harris, Jr: If it sounds too
How to get rid of your old devices safely
Disposing of old tech isn’t a one-click solution; there are multiple things you have to consider before moving on to greener pastures Black Friday, Cyber Monday and even Christmas are behind us. Which means some of us may have been fortunate enough to unwrap a shiny new laptop, smartphone or tablet. But what about our
20 tips for 2020: Mistakes to avoid
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices As we’re entering 2020, we’re also plotting out our New Year’s resolutions. Instead of suggesting what you should do next year, however, let’s have a look at some cybersecurity mistakes you should avoid
20 tips for 2020: Be smarter with your smartphone
In the second blogpost of this two-part series we’ll suggest handy tips to help enhance the security of your mobile devices Yesterday, we discussed bad cybersecurity habits you should avoid in 2020, especially where computers are involved. We’re not done yet. Some of the recommendations apply to both computers and smartphones, such as being especially
Discovering Careers in Cybersecurity
We were excited to celebrate National Cybersecurity Career Awareness Week (NCCAW), November 11-16, 2019. Technology and cybersecurity play a vital role in many facets of our lives. Our growing dependence on the internet and the convenience of technology comes with unique challenges. Attackers are constantly trying to steal sensitive data and cripple systems, such as
3 security tips to protect yourself from skimming attacks
E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice. TechRepublic’s Karen Roby talks with Aanand Krishnan, founder and CEO of Tala Security, about protecting consumers’ identity while shopping online. The following is an edited transcript of their
Get yourself cybersecure for 2020
Technology is changing our lives for the better; yet it’s also exposing us to organised crime, online scammers and hackers – and whole industries built around monetising our personal data. But you don’t have to be resigned to cyber-victimhood. Give yourself, and your devices, a security update for 2020 and start fighting back. Random and
FTC Issues Biennial Report to Congress on the National Do Not Call Registry
The Federal Trade Commission has issued its biennial report to Congress focusing on the use of the National Do Not Call (DNC) Registry by both consumers and businesses and other organizations over the past two years. This year’s report includes: 1) a summary of current Registry operations; 2) a summary of the impact on the
Visa Warns About Hackers Stealing Gas Pumps Credit Card Data
Payment processing company Visa reported that attackers at gas pumps intercept credit card data from point-of-sale networks, which are becoming increasingly attractive targets for such cybercrime organizations due to their lack of safe recognition software. Visa said its Payment Fraud Disruption or PFD teams detected three separate threats targeting point-of-sale retailer or POS networks expected
NSA congratulates Centers of Academic Excellence (CAE)
FORT MEADE, Md., Dec. 13, 2019 — The following academic institutions were recognized as designated or re-designated CAE schools at the November 2019 NICE conference: Air Force Institute of Technology Arapahoe Community College Auburn University Baker College Bluegrass Community and Technical College Brookdale Community College Butler Community College Century College Coastline Community College Columbus State
FTC Obtains Record $191 Million Settlement from University of Phoenix to Resolve FTC Charges It Used Deceptive Advertising to Attract Prospective Students
The University of Phoenix (UOP) and its parent company, Apollo Education Group, will settle for a record $191 million to resolve Federal Trade Commission charges that they used deceptive advertisements that falsely touted their relationships and job opportunities with companies such as AT&T, Yahoo!, Microsoft, Twitter, and The American Red Cross. Under the settlement unanimously
Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum
South Korean cryptocurrency exchange Upbit today said hackers could steal $49 million in Ethereum. On 27 November, the crypto-coins were moved from Upbeat Ethereum Hot Wallet to an unknown wallet, announced Doo-myeon’s CEO Lee Seok-woo who operates Upbit. In a publication on the Upbit website, the hackers, Seokwoo, disclosed 342,000 ETH (Ethereum), equivalent to approximately
What sort of security software and backups do I need for a home business?
I’m looking to set up a small business working from home, and would like some advice on back up and security measures. I have an Office 365 account so my main directory for saving documents will be OneDrive. I was looking to back up on a Synology NAS drive, perhaps to two separate hard drives
5 scams to watch out for this shopping season
Black Friday and Cyber Monday are just around the corner and scammers are gearing up to flood you with bogus offers According to Adobe, consumers in the US are predicted to spend a staggering US$143.7 billion this shopping holiday season. Unsurprisingly, smartphones are expected to account for a significant part of the purchases made. Shopping
Do NOT Answer Your Phone!
Follow my blog with Bloglovin That’s right! We said do NOT answer your phone! There have been way too many issues lately of innocent yet unknowledgeable people getting scammed out out their hard earned money. The first thing to know with your phone is to NOT answer the phone if you DO NOT KNOW who
SCAM ALERT-SSA
Follow my blog with Bloglovin SCAM ALERT SOCIAL SECURITY ADMINISTRATION CALLING SCAM DO NOT ANSWER The Social Security Administration recently announced that the public is being scammed with threats to cancel individual’s social security numbers. The victims are being told that they have “committed a fraud” and they are told to pay the SSA money
Welcome to Making Sense of Security
Follow my blog with Bloglovin Welcome to Making Sense of Security. Technology is evolving at a rapid speed. There is much advancement at the stroke of a key. Making sense of what functions best for one may not be for another. Keeping up with advancements to be able to maintain functions is vital. We are
New FBI Wanted App
The FBI has launched a free new mobile app to enlist the public’s help in locating and identifying wanted fugitives, missing persons, and others sought by the Bureau. You’re watching your local news on TV when you see a story on a wanted fugitive in your community. The person looks like someone you’ve seen living
FBI Releases New Bank Robbers Mobile App
The FBI launched a mobile version of its Bank Robbers website to make it easier for smartphone users to view photos and information about bank robberies. Back in December 2012, the FBI launched its Bank Robbers website featuring a gallery of unknown bank robbery suspects wanted by the Bureau. Because the FBI, in its own
FBI Seeking Tech Experts to Become Cyber Special Agents
“One thing that no one else can offer is the mission and the camaraderie and the teamwork the FBI brings to the table,” Anderson said. “Cyber agents will be integrated into all the different violations that we work. So whether it’s a counterterrorism or counterintelligence investigation, they could be the lead agent in the case.”
Protecting Our Children with Technology and Partnerships
Essentially, CETS is a repository that can be filled with records pertaining to child pornography and child exploitation cases. The system can contain images, case information, identities of known offenders along with information about their Internet addresses, and other related material. The program can analyze millions of pornographic images, helping law enforcement personnel avoid duplication
New Tools to Find FBI’s Most Wanted
Not all FBI fugitives are included in the Most Wanted section. Many bank robbers, for example, are publicized through local Bureau press releases or through various state or local websites. See our Bank Robbery webpage for a list of those sites and additional information. Early on, our fugitive posters were commonplace in federal buildings, most