The world’s most wanted hacker is basically a nerdy supervillain
On Sunday, the New York Times published a story on Evgeniy M. Bogachev, described as “the most wanted cybercriminal in the world,” full of details about the hacker’s crimes, plots, some incredible tidbits and a photo to end all amazing FBI photos. Bogachev has long been sought after for his hacking schemes, draining millions of […] more…Hackers are Cashing in on Instagram Likes
They say popularity has its price. This saying holds a new weight when it comes to the growing influence of social media. In fact, your “Likes” may be worth more to hackers than your credit card number. As counterintuitive as it may seem, your social clout has become the new target of hackers. And they’re […] more…Are Your Kids Using Vault Apps to Hide Photos, Chats, or Videos?
A number of apps for both the Android and iPhone exist that are great for storing your personal “gems,” those pieces of digital data you want to keep under lock and key on your smart phone. The apps store data such as logins and passwords, private photos, and keep them safe from hands of hackers, […] more…Hackers focus energy on solar sector
Researchers at security management company AlienVault are tracking highly skilled espionage group that is targeting two US manufacturers of solar panels. The hacker group, thought to be from China, is targeting design documents using complex and well-obfuscated rootkit-like malware. Tags: Hackers Industry News more…Potentially Malicious Apps Your Kids May Use
It’s a question I get several times a year from anxious parents, either via a direct message, an email or even in line at the grocery store. It goes something like this: “What’s the one thing you wish you’d done better when monitoring your kids’ technology?” Both of my kids are now young adults, and together, we survived a handful of digital mishaps. So, I tend to have a few answers ready. I’ll go into one of […] more…Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Dox, steal, reveal. Where does your personal data end up?
The technological shift that we have been experiencing for the last few decades is astounding, not least because of its social implications. Every year the online and offline spheres have become more and more connected and are now completely intertwined, leading to online actions having real consequences in the physical realm — both good and […] more…Is WhatsApp Safe for Kids? Here’s What Parents Need to Know
We may be talking about the TikTok app in our public circles, but there’s another app — just as widely used — that kids are hoping parents’ won’t ask too many questions about. That’s because they can use the messaging app WhatsApp to talk privately with friends, exchange content and videos, and (hopefully) fly under […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- #CyberAware: Teaching Kids to Get Fierce About Protecting Their Identity
- Tax Phishing Campaign Reminds of DMARC Limitations
- iOS, “MacOS,” MacBook Pros, and all the other WWDC 2016 rumors fit to print
- Microsoft releases some ‘optional, non-security, C/D Week’ Win10 patches. Avoid them.
- Microsoft Windows Network Policy Server CVE-2015-0015 Remote Denial of Service Vulnerability
- News in brief: WannaCry knocks out Honda plant; Skype hit by global outage; NSA shares tools on GitHub
- Chrome smoked by Edge in browser phishing test
- Neo Technology execs: How Neo4j beat Oracle Database
- Facebook tests end-to-end encrypted Secret Conversations on Messenger
- DigiCert Addresses Mozilla’s Concerns on Symantec CA Acquisition