Saturday, 30 May 2020

Geek or Nerd: The Labeling Game

Are you a geek? How about a nerd? These two words have generated significant, often heated debate throughout the years, especially within the past decade or two. Are they really that different? And where did the words originate?

The Original Geek

Believe it or not, the word “geek” used to have a much more negative connotation that it does today. In the early 1900s, a geek was someone who worked in the circus, doing strange or grotesque feats. If a guy made a living from swallowing insects whole, biting off the body parts of live animals, or something equally disgusting, he was a geek.

After a while, the word morphed into an expression meaning someone strange and creepy, someone who lived outside mainstream society. A geek was the guy living on the edge of town, prowling around and peeking in windows at night.

The Arrival of the Nerd

Over the next couple of decades, “geek” transitioned to mean someone odd, yet intelligent. At one time, it was nearly synonymous with “nerd.” “Nerd” cropped up first as a nonsense word in a 1950s Dr. Seuss book called If I Ran the Zoo, and it quickly crept into popular slang usage. Its meaning at first was more akin to “fool” or “square,” but it eventually came to mean someone extremely intelligent, yet very socially awkward. Like the late 90s term “gearhead,” it meant the kind of person who invented things, created tons of computer code, enjoyed high-level math, or did crazy scientific experiments. Or possibly all three.

As recently as the early 2000s, either “nerd” or “geek” was a slur, a word that a bully might hurl at a classmate. People did not enjoy being dubbed “geeks” or “nerds.”

Expanding Definitions

Today, although “nerd” is still somewhat negative, the term “geek” has a more positive connotation. In fact, many people wear the “geek” label with pride and refer to themselves as “geeks.” What’s the difference? Now, the term designates someone with a strong interest in something, who also possesses abundant knowledge about that topic. It refers to fascination on a level that approaches obsession. There are computer geeks who are experts with tech, Star Wars geeks who know countless random bits of trivia, and a million other types of geek.

Culture and the Geek

While the term can apply to a broad variety of interests, there is a definite “geek culture.” Since it is constantly morphing and shifting, it is difficult to define. Let’s just say that it may involve the Lord of the Rings, A Hitchhiker’s Guide to the Galaxy, Star Wars, ComicCon, Dr. Who, Marvel comics, huge gaming rigs, a love of ancient cultures, and an ambition to see technology advance. Think the “Big Bang Theory,” and you have a fairly accurate picture of modern geek culture.

So are you an intelligent, invested “nerd” or a social, savvy geek? Maybe you feel like you’re a little bit of both. Maybe you should create a brand-new label. Or perhaps it’s time to move beyond the labels altogether.



from We Hate Malware https://ift.tt/2zL6Ntl

Friday, 29 May 2020

NSA: Sandworm Actors Exploiting Vulnerability in Exim Mail Transfer Agent

Russian cyber actors from the GRU Main Center for Special Technologies (GTsST), field post number 74455, have been exploiting a vulnerability in Exim Mail Transfer Agent (MTA) software since at least August 2019, warns a new National Security Agency (NSA) cybersecurity advisory.

from Cyber Security News https://ift.tt/3dfgC0Z

Christopher Davis Named Chief Information Officer at Mspark

Mspark, a national shared mail company, has named Christopher Davis as Chief Information Officer.

from Cyber Security News https://ift.tt/2ZQ7agS

VivaVideo, “Spyware” App Maker, Contains Remote Access Trojan and Requests Dangerous App Permissions

VivaVideo, Chinese "spyware" app with at east 100 million installs on the Android Play Store, is requesting dangerous permissions, including the ability to read and write files to external drives and an user's specific GPS location.

from Cyber Security News https://ift.tt/2XK89N1

Smile, You're on Camera: The Facial Recognition World Map

There’s a good chance that at some point you’ve been watched, scanned, or analyzed by facial recognition technology — potentially without even realizing it, says a new study by Surfshark. 

from Cyber Security News https://ift.tt/3enKXea

Securing the Mainframe: How Companies can Empower Security Analysts to Protect the Backbone of Their Enterprise

To apply true holistic security best practices and reduce significant risks to the mainframe, security teams must embrace an integrated mainframe security strategy.

from Cyber Security News https://ift.tt/2ZOLdP6

Thursday, 28 May 2020

Department of Energy Picks USTA for $111 Million Cybersecurity Institute

The University of Texas-San Antonio has been selected to receive a five-year, $70 million cooperative agreement from the U.S. Department of Energy to establish and lead the Cybersecurity Manufacturing Innovation Institute (CyManII).



from Cyber Security News https://ift.tt/3gvWrOx

RSA Conference 2021 Moves to May

RSA Conference announced that RSA Conference 2021 will now take place the week of May 17 instead of in February as previously planned. 



from Cyber Security News https://ift.tt/2X9Ufod

Laura Money Named Executive Vice President & Chief Information Officer at Sun Life Financial

Sun Life Financial Inc. has announced the appointment of Laura Money as Executive Vice-President and Chief Information Officer.

from Cyber Security News https://ift.tt/3gwo1LD

ISACA Enhances CSX Cybersecurity Practitioner Certification to Test 20 Cybersecurity Skills

ISACA has updated its performance CSX Cybersecurity Practitioner (CSX-P) certification with expanded job tasks that span and test across five key security functions – Identify, Protect, Detect, Respond, and Recover.

from Cyber Security News https://ift.tt/2X89cXO

More than 14,000 Federal Workers Filed Whistleblower Cases from 2014-2018

Probationary employees—generally those with less than 1 or 2 years of federal service—can be especially vulnerable to reprisal because they have fewer protections from adverse personnel actions, including termination, the Government Accountability Office found. 

from Cyber Security News https://ift.tt/2X9IBtD

GAO: Federal Agencies Need to Coordinate on Requirements and Assessments of States

The US Government Accountability Office reviewed four federal agencies and found that they did not have policies for coordinating assessments with states and none of them had policies for coordinating assessments with each other.

from Cyber Security News https://ift.tt/3gtOyJr

“Evolution of IoT Attacks” Study Exposes the Arms Race Between Cybercriminals and Cybersecurity

The number of devices connected to the internet is expected to reach 50 billion worldwide by the end of 2030, posing dangerous risks to people, businesses and critical systems.

from Cyber Security News https://ift.tt/3gvYSRm

NIST Seeks Public Input on Use of Positioning, Navigation and Timing Services to Improve Cybersecurity

To bolster the resilience of the Global Positioning System (GPS) and the wide scope of technologies and services that rely on precision timing, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) is requesting information from the public about the broad use of positioning, navigation and timing (PNT) services, as well as the cybersecurity risk management approaches used to protect them.

from Cyber Security News https://ift.tt/3c9huTF

Wednesday, 27 May 2020

As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

New security threats are surfacing every day, driving IT and security operations teams to quickly understand and address significant security threats.

from Cyber Security News https://ift.tt/2AbNVDI

Security 500 Benchmarking Survey Now Available!

The Security 500 Survey is now available online, and we want your input!



from Cyber Security News https://ift.tt/3daFWFt

The Expanding COVID Attack Surface

COVID-19 is a killer virus, with deadly outcomes every day that are profoundly impacting lives, economies and futures.



from Cyber Security News https://ift.tt/3gu0cUy

NIST Formula May Help 5G Wireless Networks Efficiently Share Communications Frequencies

Researchers at NIST have developed a mathematical formula that, computer simulations suggest, could help 5G and other wireless networks select and share communications frequencies about 5,000 times more efficiently than trial-and-error methods. 

from Cyber Security News https://ift.tt/36CrfbH

Popular App Mathway Leaks 25 Million User Records

More than 25 million user records, belonging to popular math app Mathway, are being sold on the dark web. 

from Cyber Security News https://ift.tt/2X81ddx

43% of Americans are Comfortable with Insurance Companies Using Artificial Intelligence

The majority of Americans (87 percent) are comfortable sharing personal and lifestyle-focused data for the benefit of lower insurance premiums, according to a new insurance study conducted by DXC Technology 

from Cyber Security News https://ift.tt/3gusRsQ

Tuesday, 26 May 2020

84% of Businesses Will Increase Work-from-home Capacity Beyond Pandemic Despite Security Concerns

Despite security issues and concerns resulting from the massive and sudden increase in work-from-home (WFH) initiatives caused by the global COVID-19 healthcare crisis, one-third (38%) of U.S. companies observed productivity gains during remote work and 84% anticipate broader and more permanent WFH adoption beyond the pandemic



from Cyber Security News https://ift.tt/2ZFZFZG

Most Tech-Savvy Americans Have Worst Online Safety Habits

A new survey says that a vast majority of Americans say they value online safety, but many have habits that compromise the safety of their data and various online accounts—especially the tech-savvy younger generations who grew up during and after the internet revolution.



from Cyber Security News https://ift.tt/36xIvio

BCG Study: APAC Slow to Adopt Cloud due to Talent Shortages

A new eight-nation APAC study conducted by Boston Consulting Group (BCG) shows that spending on the public cloud and related services is growing, yet organizations aren’t confident about the security of cloud infrastructure and are holding back. 

from Cyber Security News https://ift.tt/3gndv9m

Monday, 25 May 2020

Cyber Resilience: A New Way of Looking at Cybersecurity

The risks of an attack are not new, but as incidents become more sophisticated and persistent, organizations need to move from cybersecurity to cyber resilience.

from Cyber Security News https://ift.tt/2AUgENA

Black Hat USA Announces Briefings and Programs for 2020 Virtual Event

Black Hat announced details for its virtual event, taking place August 1st – 6th



from Cyber Security News https://ift.tt/3c0lMNe

Virtual Reality Headsets Take You Out of This World – Literally

It’s been a dream of many developers for a very long time. Futurists, visionaries, software developers, and gamers alike have been interested, invested, and excited about this prospect for a very long time. It is virtual reality. Finally, the dream has come true. These new virtual reality headsets can transform your brain, your life, your view, your perspective, and your life experiences. For example, you can actually now skydive through the oculus rift virtual reality headsets, without leaving your bedroom, and without needing a parachute. You can actually feel the real feeling of the experience itself – while not having to actually do it.

This is magical, make believe, while at the same time being unbelievable, but true. The new virtual reality headset is now available from Oculus Rift, Play Station, HTC Vive, and Google Cardboard. This is an all purpose device that can help you experience things beyond your reality, and also help you to create new realities at the same time. Facebook actually purchased the Oculus Rift for 2 billion dollars.

The new virtual reality headset has many thoughtful touches along with an elegantly geeky look. For some reason though, this geeky look is the new cool with a soft carrying case, and a cyber hacker’s console. The virtual reality headsets are usually manufactured and sent out in black. In having tried out the Oculus Rift for the first time, I can sincerely say that it is truly a cool experience.

That being said, it does have some touches you need to do in order to use it best. It’s important to angle the screen so that it is glaring directly into your eyes. This makes the clarity and the viewer quality much better to give you the best experience. It takes a while before you can get used to your VR headset, but once you’ve got it, you’ve got it, and you can then angle it at that just right position for all future use and gaming.

In my experience, gaming just got better. It’s like having an interesting addition to the game in order to make the experience that much more interesting and engaged with the computer screen. When you’re in flying game for example, you can see the whole cockpit all around you, from front to back. It feels like you are actually racing or flying. These simulations make the virtual reality headset indispensable for total experience and engagement gaming.

Overall, this is a very interesting product that will provide hours of online fun on your favourite video games and simulations. It’s a great way to get together with your friends for a good time and it’s just plain interesting to see how it’s going to change the world, the way we interact, and the way we experience life. My first choices to use the headset for include snowmobiling, diving, flying on a private jet, and horse racing! All things that I haven’t had the chance to do and that are a little more difficult to do when you have a family and a full time job with little time, money, and space for adventure! Adventure is now in the VR.



from We Hate Malware https://ift.tt/2ywFlim

Friday, 22 May 2020

Jeff Whitaker Named Chief Information Officer at Eastern Kentucky University

Jeff Whitaker was named Eastern Kentucky University’s Chief Information Officer, the University announced. 

from Cyber Security News https://ift.tt/3bW4eBR

Joyce Hunter Appointed Executive Director of the Institute for Critical Infrastructure Technology

The Institute for Critical Infrastructure Technology (ICIT), a nonprofit cybersecurity and technology think tank, named Joyce Hunter as Executive Director.

from Cyber Security News https://ift.tt/36udc8k

Facebook Announces Permanent Remote Work Option for Employees

Facebook CEO Mark Zuckerberg announced that the company will allow permanent remote work for many of its existing employees. 

from Cyber Security News https://ift.tt/2LS9s6Q

Thursday, 21 May 2020

Four Reasons to Integrate Security Early in Design: Safety, Savings, Aesthetics & Support

When we do a risk assessment, we evaluate the facility’s needs and identify any gaps in their physical security barriers and policies and procedures. Why should you integrate security early in the design process?

from Cyber Security News https://ift.tt/3bN69bO

New Malware Variant Can Steal Data from Browsers and Cryptocurrency Wallets

A Reason Labs research team has discovered a new variant of the Raccoon malware family. Initially discovered back in 2019, the Raccoon malware family is used to steal confidential data and browser information.

from Cyber Security News https://ift.tt/3e3qKtZ

70% of Organizations to Increase Cybersecurity Spending Following COVID-19 Pandemic

With coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. 

from Cyber Security News https://ift.tt/2TqrilL

FIRST Updates Coordination Principles for Multi-Party Vulnerability Coordination and Disclosure

The Forum of Incident Response and Security Teams (FIRST) has released an updated set of coordination principles – Guidelines for Multi-Party Vulnerability Coordination and Disclosure version 1.1.

from Cyber Security News https://ift.tt/3e7jBZD

Wednesday, 20 May 2020

The Best Free Cleanup Software for Mac OS X

There aren’t loads of programs out there that warrant users to fork out money for to enjoy their features. A good chunk are premium, but the point is you can get around pretty well with free apps.

When it comes to Mac OS X cleanup, two programs particularly stand out: CleanMyMac and Dr. Cleaner. While one comes at a fee, the other is free. But do you really need to spend that money while in actual sense you can get the features that you can really deem useful for free?

Here’s what we think!

  1. All Disk Scan

As the name suggests, this app performs a full scan of the whole disk. Looking at this from a software technician’s perspective, utility software shouldn’t have any issues scanning all disk parts. However, doing so goes contrary to Apple’s security concept for system-level files, where chances of garbage buildup are slim. File cleanup at this level may even lead to a system crash if casually removed.

Dr. Cleaner is an app that comes for free in the Mac App Store, and this makes it a perfect tool that falls in line with the Apple concept: it scans all areas users or third-party programs may reach, but it won’t compromise your system’s stability.

  1. Large File Scanning

Typically, users tend to ignore things they have downloaded – movies or large software installation packages, for example. These large files usually take up almost, or more than half of the disk disposable space.

Scanning for these files will mostly come at a cost – as is the case with CleanMyMac. In exchange for its users support, however, Dr. Cleaner offers this appreciated function for free.

  1. System Cleaning

According to CleanMyMac, system log files, user cache files and application language packs all fall under ‘System’. Looking at the latest version of Dr. Cleaner, cleanup of system and user cache files is supported. Not so for application language packs because of safety concerns.

Dr. Cleaner reckons that should the language pack be removed, program errors may occur for certain software. Not only that, there is no point in removing a single language pack which but translates to a very small fraction of disk space,

  1. Garbage Cleanup

This performs the function of cleaning up trash files. It’s still a bone of contention whether or not this is one of the features CleanMyMac charges you for, but it comes for free with Dr. Cleaner.

  1. iPhoto Cleanup

Residual cache files that boost the photo-browsing experience for the user is a benefit iPhoto users can gain when they synch their phone camera with the computer terminal. On the flipside, it also burden the disk by consuming more space.

You can view this space issue as a double-edged sword, because on the other hand, browsing is speeded up. This is true for frequent iPhoto users but can be superfluous for the occasional user.

CleanMyMac offers this feature as a value-added service, but Dr. Cleaner merges it with iTunes cache-cleaning due to its simplicity which doesn’t warrant separating out independently.

  1. Eraser

The whole point of an eraser is to make a file vanish completely without any possibility of recovery. For the ordinary user, this is unnecessary and there is no going back once you hit that button. As such, you can say it only comes in handy when putting up your Mac for sale where you don’t want your deleted files to be recoverable.

  1. Cleaner’s Smart Detective

This is a handy feature from Dr. Cleaner that automatically detects and totally cleans junk files that remain after uninstalling. All you have to do is drag them to Trash.

Let’s conclude by saying that with regard to disk cleanup, you should have an insight into the more frequently used functions. So, before you spend about $39 on a cleanup product, first try out a free one that fulfills about 80% of the functions.



from We Hate Malware https://ift.tt/2Xk8MNb

Shirley Erp Named Chief Information Security Officer for the City of Austin, Texas

The City of Austin, Texas has named Shirley Erp as its Chief Information Security Officer (CISO).

from Cyber Security News https://ift.tt/3bUzQYE

192 Million Records Leaked by Natura & Co., Brazilian Online Retailer

The security team at Safety Detectives, currently led by Anurag Sen, discovered a significant data breach, including personally identifiable information, belonging to Brazilian retailer Natura & Co. 

from Cyber Security News https://ift.tt/3bO00Mn

9 Million Customer Records Compromised in easyJet's Cyberattack

easyJet has suffered a "sophisticated" cyberattack, which compromised 9 million customer records. 

from Cyber Security News https://ift.tt/3cPOXnc

Utilizing Intelligence to Extend the Security Perimeter

Extending the perimeter by instituting a corporate security intelligence program enables companies and organizations to stay well ahead of threats and often helps inform strategic and operational decision-making.

from Cyber Security News https://ift.tt/3g5Kfnx

Tuesday, 19 May 2020

UL Announces Supply Chain Cybersecurity Solution

UL announced the debut of its Supplier Cyber Trust Level solution, which it says helps organizations minimize supply chain cybersecurity risk by focusing on the trustworthiness of suppliers’ security practices.

 



from Cyber Security News https://ift.tt/2Xc93BJ

Financial Services Companies Lack Trusted Data to Make Cybersecurity Decisions

Senior security leaders within financial services companies are being challenged with a lack of trusted data to make effective security decisions and reduce their risk from cyber, according to Panaseer’s 2020 Financial Services Security Metrics Report.

from Cyber Security News https://ift.tt/3cMp7Rc

Louisiana Tech University’s College of Engineering and Science Announces Cybersecurity Scholarships

Louisiana Tech University’s College of Engineering and Science will award six students with a CyberCorps Scholarship for Service (SFS) for the 2020-21 academic year.

from Cyber Security News https://ift.tt/3g5ZRra

51% of Organizations Say Their Security Teams are Prepared for Rising Cyberattacks during COVID-19

Only 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to the rising cybersecurity attacks during COVID-19, according to new research by global association ISACA. A

from Cyber Security News https://ift.tt/3cNhSrZ

Rachel Stahler Named Chief Information Officer at Organon & Co.

Rachel Stahler has been named Chief Information Officer for Organon & Co., Merck's intended spinoff of its women’s health, legacy brands and biosimilars businesses.

from Cyber Security News https://ift.tt/3e1SHlW

Verizon 2020 Data Breach Report: Money Still Makes the Cyber-Crime World go Round

The Verizon Business 2020 Data Breach Investigations Report (2020 DBIR) shows that financial gain remains the key driver for cybercrime with nearly nine in 10 (86 percent) breaches investigated financially-driven.



from Cyber Security News https://ift.tt/2LJ2Yam

Using a Privacy-First Mindset to Transform Data into Intelligence

Why does the practice of Data Economy typically requires a solid understanding of the characteristics of the underlying data resource? And how can that data be transformed into useful intelligence, where these processes are carried out with the upmost care to represent the interests of the Data Subject?

from Cyber Security News https://ift.tt/2LD3ZRk

Monday, 18 May 2020

Average American Had Personal Information Stolen at Least 4 Times in 2019

Personal finance website Interest.com determined that the average American had their personal data stolen about once every three months or about four times over the course of the year,



from Cyber Security News https://ift.tt/36fMTme

Sunday, 17 May 2020

How Hackers are Exploiting COVID-19

Cybercriminals hope to go unnoticed. They often work in the dark depths of the Internet, but now, they are showing their true colors in the COVID-19 pandemic.

from Cyber Security News https://ift.tt/2LPmbHL

The University of Windsor and BlackBerry Partner to Educate Future Data Scientists

The University of Windsor and BlackBerry Limited have partnered to develop and deliver a cybersecurity curriculum for the University's Graduate Master's Program in Applied Computing.



from Cyber Security News https://ift.tt/3cLoPtK

Friday, 15 May 2020

5 PC Upgrades That You Can Afford

Sure, your desktop PC is great, but you’re itching for an upgrade. The trouble is, you don’t have a huge budget to swap out all the hardware to the most cutting-edge stuff. How can you make your dollar stretch further and get the improved performance that you want? You’re about to find out.

More Memory

And more, and more. As much as you can fit into your current hardware. Go ahead and max it out—you can do that without maxing out your budget, since memory is fairly cheap. Load up on memory and you’ll see an instant boost in performance. When you select the memory, be sure to pick the fastest kind that your system can take. You may even be able to do a little over-clocking.

A High-Powered Video Card

Whether you’re a gamer or a media enthusiast, you’ll notice the difference immediately when you upgrade your video card. For a few hundred bucks, score a graphics card with drastically improved resolution capability, frame rates, and overall quality. Just make sure that your current CPU can keep up with the new guy in the system.

A New Computer Case

Okay, so this may not directly improve the speed and power of your machine, but it can definitely make your rig more user-friendly. Whatever bugs you about your current case, fix it with a new one. Go with a new case that can handle USB 3.0 or higher, or one that you can open up more easily for hardware swaps. Maybe you just want something that looks cooler, with more clear panels through which you can see the whirling, glowing fans and all the fantastic components. Whether you need more bays, slots, and connectors or better looks, getting a new case can quiet the upgrade urge— for now.

A Bigger Hard Drive

More space for your stuff? Yes please. Treat yourself to a massive hard drive upgrade— we’re talking a terabyte or two of space, room enough for all your games, your favorite programs, your media, your photos, and your documents— plus the kitchen sink.

A Faster Hard Drive

If you like to keep a sleek, streamlined machine, and you don’t need or want a virtual cavern of storage space, skip the 2TB hard drive and go with a solid state drive instead. These speedy drives keep dropping in price, so you should be able to snag a sizeable one for a couple hundred dollars. If you want fast speeds plus extra space, consider having two drives in your system— a solid state drive as your primary drive, hosting your operating system, and a standard secondary hard drive for extra storage.

The next time you start craving a system overhaul that’s not in your budget, indulge yourself with a smaller upgrade that gives you a serious performance boost. When you spend your cash wisely, you can make a difference in your cyber life without breaking the bank.



from We Hate Malware https://ift.tt/2y5K6zc

Industrial Network Cybersecurity: Debunking the Myths and Adopting Best Practices

Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.

from Cyber Security News https://ift.tt/2T8wtXk

British Supercomputer ARCHER Suffers Cyberattack

British Supercomputer ARCHER, which is used for academic research by Universities operating in the U.K., has been hit by a cyberattack, forcing the admin to reset all user passwords and SSH keys. 

from Cyber Security News https://ift.tt/2y5RA5f

78% of Organizations Use More than 50 Cybersecurity Products to Address Security Issues

Data security is creating fear and trust issues for IT professionals, according to the third-annual Oracle and KPMG Cloud Threat Report 2020. T

from Cyber Security News https://ift.tt/2y59m8R

CISA Releases Notice of Funding Opportunity for Emergency Communications

CISA released a Notice of Funding Opportunity (NOFO) to fund up to two demonstration projects that address the National Emergency Communications Plan and identify innovative solutions to improve the delivery of rural medical communications.



from Cyber Security News https://ift.tt/2yZyOwU

FBI & CISA Warn Against Chinese Targeting of COVID-19 Research Organizations

The FBI and CISA issued a Public Service Announcement warning organizations researching COVID-19 of likely targeting and network compromise by China.

from Cyber Security News https://ift.tt/2T37mVV

Thursday, 14 May 2020

The Future of Network Security is Now - Whether We Like It or Not

Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.



from Cyber Security News https://ift.tt/2zAJPoj

Six Steps to Boost Email Security for Remote Employees

To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).

from Cyber Security News https://ift.tt/2WVpJx5

Do Contact Tracing Apps Infringe on Privacy/Security?

How can 'Big Tech' help provide innovative solutions to address the unmet challenges of contact tracing?

from Cyber Security News https://ift.tt/2Lwg2Qc

Flaws in Cybersecurity Software Expose Hundreds of Networks to Cyberattacks

Cybersecurity flaws have been exposed in cybersecurity provider Cyberoam's security products. 

from Cyber Security News https://ift.tt/2Wx0RN8

U.S. Consumers Need to Better Protect Themselves When Banking Online

A new study from FICO found a large percentage of Americans currently do not take the necessary steps to protect their passwords and logins online.



from Cyber Security News https://ift.tt/2X1B5jk

Compliance is a Significant Barrier to Business Performance

What is the impact of cybersecurity compliance in this new age of accelerating regulation, pandemic-driven communications and as business processes move to the cloud?

from Cyber Security News https://ift.tt/3fKmt0h

Trends and Underlying Challenges for CISOs, Aspiring Security Leaders and Executive Recruiters

A new Kudelski Security report provides insights and recommendations to help organizations address recruiting, retaining and developing the next generation of security leaders.

from Cyber Security News https://ift.tt/2yOlaga

Wednesday, 13 May 2020

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port. 

from Cyber Security News https://ift.tt/3cyLk52

How to Defend Against Digital Surveillance when Teleworking

As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.



from Cyber Security News https://ift.tt/3fM2jTu

Kimberly Anstett Named Chief Technology Officer at Iron Mountain

Kimberly Anstett has been appointed Executive Vice President and Chief Technology Officer (CTO) at Iron Mountain Incorporated, storage and information management services company enabling digital transformation.

from Cyber Security News https://ift.tt/2WtdN6I

Digital Fraudsters Use COVID-19 Scams to Target Younger Generations

TransUnion released its quarterly analysis of global online fraud trends, which found that the telecommunications, e-commerce and financial services industries have been increasingly impacted.

from Cyber Security News https://ift.tt/2y3yo8o

(ISC)2 CISSP Certification Now Comparable to Masters Degree Standard

(ISC)² announced that the Certified Information Systems Security Professional (CISSP) certification has been found comparable to Level 7 of the Regulated Qualifications Framework (RQF) in the UK, denoting that the certification is comparable to Masters degree standard.



from Cyber Security News https://ift.tt/2Lp8XRF

Tuesday, 12 May 2020

Colin Murphy Named Chief Information Officer at KnowBe4

KnowBe4, a provider of security awareness training and simulated phishing platforms, announced it has promoted special operations engineer Colin Murphy to the chief information officer position. 



from Cyber Security News https://ift.tt/2WPF9D4

Financial Industry Veteran Thomas Barkhuff Joins CLS as Chief Information Officer

CLS announced the appointment of Thomas Barkhuff as Chief Information Officer.

from Cyber Security News https://ift.tt/3btQ2j4

Zoom Settles with NY AG over Privacy and Security Concerns

New York Attorney General Letitia James announced an agreement with Zoom Video Communications that will provide security protections for more than 300 million meeting participants on the platform.

from Cyber Security News https://ift.tt/35Rb0aq

8.4 Billion Records Exposed in Q1 2020

The number of records exposed for Q1 2020 skyrocketed to 8.4 billion –  a 273 percent increase compared to Q1 2019. 

from Cyber Security News https://ift.tt/2xWMQyX

Synopsys Study Shows 91% of Commercial Applications Contain Outdated or Abandoned Open Source Components

A new Synopsys report highlights trends and patterns in open source usage within commercial applications, and provides insights and recommendations to help organizations better manage open source risk from a security, license compliance, and operational perspective.

from Cyber Security News https://ift.tt/2xUF6gH

ResiCAV Project Highlights Urgent Need for UK Transport Cybersecurity Center

A consortium of industry, government and academia has explored the viability of creating a UK cybersecurity ‘Centre of Excellence’ to better deal with cyber threats in the transportation sector. 

from Cyber Security News https://ift.tt/2YXH76U

Educational Organizations at Risk of Data Security Incidents during COVID-19 Pandemic

A new Netwrix report reveals that many educational organizations are at risk of data security incidents during the current period of working from home and virtual learning.

from Cyber Security News https://ift.tt/3fGrfMb

Monday, 11 May 2020

Cognizant Anticipates $50-70 Million Loss Following Ransomware Attack

Cognizant, IT services provider, expects its Q2 revenue to be significantly impacted due to a ransomware incident that took place in April 2020. 

from Cyber Security News https://ift.tt/3cqJTp6

MobiFriends Data Breach Affects 3.68 Million Users

The personal details of 3,688,060 users registered on the MobiFriends dating app were posted online earlier this year and are now available for download on numerous online forums. 

from Cyber Security News https://ift.tt/3bnxpNQ

Sunday, 10 May 2020

Billy Spears Named CISO at Alteryx

Alteryx Inc. announced that Billy Spears has joined the company in a new role as the Chief Information Security Officer (CISO).  

 



from Cyber Security News https://ift.tt/2T9D1VR

Choosing the Best Web Hosting Plan

With your website already set, you’re now wondering how and where you can find a web hosting plan that will be able to accommodate all your needs. Getting it right for the first time is crucial if you look at the bigger picture; changing your hosting provider will cost you in terms of time and downtime which may lead to loss of both existing and probable customers.

Ask yourself

There are a few issues you need to grapple with when it comes to web hosting:

  • Is your website meant for personal or business use?
  • What kind of customer service and technical support are you looking for?
  • As the business grows, will the provider be able to accommodate all your needs in terms of privacy and security?
  • Does the provider include domain name registration and e-commerce support? What kind of user interface, website tools, and control panel does the provider offer?

Many website owners tend to overlook some of these important issues which become a pain later on as the site grows.

Simplify your Work

Regardless of the provider you decide to go with, following are some of the things you should be looking out for:

Excellent Support

Confirm if the provider is available around the clock. Are they able to answer your queries thoroughly and swiftly? How easy is it to get in touch with them? Give it a few days trial to see if they can be able to address all your needs quickly and effectively.

Your Website must be Available

Aim for not less than 99.9% uptime. Even 98% is not good enough. If the provider can’t guarantee this level of uptime, you’re better off looking for one who can.

User Interface

Not everyone is endowed with programming skills. As such, go for a hosting service with a friendly control panel. Watch a demo, if available, and get a good feel of it.

Domain Name

Before starting the search for a web hosting package, it’s good that you know your needs. When it comes to purchasing a domain name, most companies aren’t of any help really. Some will charge you a small fee for registration, some will give it to you for free. Settle for a web hosting company that matches your needs.

Is it what they say it is, really?

Bandwidth

Never fall for companies that promise you ‘unlimited’ bandwidth. No one will bear the traffic cost for you, and some people have learned this the hard way after being slapped with ridiculous monthly fees having exhausted the ‘unlimited’ data transfer. Never make the mistake of overlooking this important point, you might end up coughing heavily in terms of cost.

Disk Space

‘Unlimited disk space’ claims are just another ploy similar to ‘unlimited bandwidth’. Most sites will take up less than 5MB of web space, and a company enticing you with 500MB knows all too well that you’ll never exhaust this within the given time. Here’s a rough estimate for you.

SSL (Secure Server), MySQL, Shopping Cart

Always check to see if these facilities are available before you tie yourself down. They will be offered as a higher priced package, or included as additional costs. For those looking to gather credit card information on their site, SSL is definitely a must.

Email, Auto-responders, POP3, Mail Forwarding

Having a personalized email address on your own domain will come in handy at some point; something like sales@yourdomain.com and so on. Look for an email software that can help you achieve this.

Price

Always remember that cheap is expensive in the long run. And going for the most expensive web hosting provider doesn’t mean you’ll get the best service either. Strike a balance. Choose a provider that is capable of providing more than you need, and their charges are favorable to you.

Today, there are many web hosting service providers, even teens working from their bedroom. In this industry though, the high cost you’re capable of meeting doesn’t have you guaranteed superior service. To avoid bias by listing some providers here, it would probably be a wise idea to check out what the community is saying on the hosting forums; there are plenty of them.

Most often, you’ll probably settle for a trade-off between cost, features you’re willing to live with, and reliability.

Happy looking!



from We Hate Malware https://ift.tt/3fEfF40

Friday, 8 May 2020

FireEye Report: A Majority of Attacks Successfully Infiltrate Enterprise Environments Without Detection

FireEye's Mandiant® Security Effectiveness Report 2020 reveals data about how well organizations are protecting themselves against cyber threats and the overall effectiveness of their security infrastructure.

from Cyber Security News https://ift.tt/3dtnCY1

Decision Automation in Security Operations Brings Transparency and Trust to AI

Like many other industry buzzwords, there’s a lot of hype around security automation. Yet, for the first line of defense in an enterprise environment, the analysts working in the security operations center (SOC), the notion of automation is more headline than reality. Many basic tasks – logging, fault isolation, reporting, and incident troubleshooting – are still very much manual.

from Cyber Security News https://ift.tt/2SMOOct

Identity-Based Attacks Proliferate as Exposed Credentials Become More Intimate

Preventing identity-based attacks such as account takeover (ATO) fraud and Business Email Compromise (BEC) begins with securing your personally identifiable information (PII), but this seems to be increasingly difficult as cybercriminals continue to evolve.

from Cyber Security News https://ift.tt/2LamNqV

Best Practices to Help Teams Stay Safe Online

The best way to protect accounts and data from credential stuffing and online phishing attacks is to stop reusing the same passwords on multiple accounts. All accounts—but especially accounts related to work, retail, finance, and government—should be protected with strong, unique passwords. What are a few best practices to ensure employees are safer online?



from Cyber Security News https://ift.tt/2WcAtYQ

Thursday, 7 May 2020

Panda Security Report: Ransomware & Fileless Attacks are a Growing Concern

The new Panda Security Threat Insights Report 2020 compiled by PandaLabs – anti-malware laboratory and security operations center (SOC)  –illuminates several emerging trends in the cybersecurity space.



from Cyber Security News https://ift.tt/2WCu5ZH

Toll Group Suffers Ransomware Attack Again

Toll Group suffers a ransomware attack for the second time in four months. 

from Cyber Security News https://ift.tt/3bf9kst

The Building of a Cyber Resilient Financial Services Sector

As we enter the new decade, we stand reminded that technological innovation and cybersecurity threats continue to develop and evolve at an incredible pace. Firms must therefore continue to build the proper defenses to protect consumer confidential data and financial market integrity. Cyber threats have become one of the top threats to the financial services sector and the ability of firms to be resilient in the face of these threats is paramount. 

from Cyber Security News https://ift.tt/3cdYSmp

Online Privacy During Pandemic: New Challenges in a New World

More companies are doing more business online to survive the pandemic, and that’ll create even more data privacy concerns going forward. At the same time, new privacy regulations have taken hold, most notably the California Consumer Privacy Act. What are 5 steps to achieve compliance?

from Cyber Security News https://ift.tt/2L8fhgn

Are you Ready for These 26 Different Types of DDoS Attacks?

Although distributed denial-of-service (DDoS) is an old school attack vector, it continues to be a serious threat to organizations. The monthly number of such attacks exceeds 400,000. To top it off, cybercriminals keep adding new DDoS mechanisms to their repertoire and security providers aren’t always prepared to tackle them. Here are 26 different types of DDoS attacks your security team needs to be ready for. 



from Cyber Security News https://ift.tt/35FRwFG

The Human Strategy is the Best Cyber Defense to Combat COVID-19

COVID-19 has impacted every facet of life and business. Millions of people around the world have been working from home to collectively slow the spread of the coronavirus. However, as the global workforce migrates from physical corporate locations to less-secure home offices, this new reality creates increased cyber threats, as employees exchange what can be sensitive data in order to prevent business operations from coming to a standstill.

from Cyber Security News https://ift.tt/2YJBMAi

Wednesday, 6 May 2020

53% of People Admit They Reuse the Same Password for Multiple Accounts

Password reuse remains rampant, with 53% of people admitting they use the same password for different accounts, which exemplifies poor password hygiene, according to a new report by SecureAuth.

from Cyber Security News https://ift.tt/3fo6epv

Is Passwordless Authentication the Future?

Each year on the first Thursday in May, World Password Day promotes better password habits. Is passwordless authentication the future?

from Cyber Security News https://ift.tt/2zkb1aB

What Elements add the Most Value to Security Leaders and Their Teams?

If you could choose three things that would enhance your security program, which three would you choose? In a new poll, the Security Executive Council  (SEC) wanted to find out what elements would add the most value to security leaders and their teams.

from Cyber Security News https://ift.tt/2WxVts3

IBM's Top 35 Women Leaders Shaping the Future of Artificial Intelligence

IBM, at its Think Digital conference, unveiled its list of Women Leaders in AI, recognizing 35 exceptional female business leaders from 12 countries who are using artificial intelligence to drive transformation, growth and innovation across a wide variety of industries.  

from Cyber Security News https://ift.tt/2Wwfj6Q

4iQ Report: The Era of Weaponized Data Breaches

According to 4iQ's Identity Breach Report 2020, the number of new identity records and the depth of personal information available in exfiltrated data are expanding, creating a blueprint of our digital identities that threat actors can weaponize and exposed identity information is now more intimate — fueling identity-based attacks across the globe. 

from Cyber Security News https://ift.tt/35CDUuU

SaltStack Report Finds Automation and Alignment are Critical to SecOps Success

New SaltStack research survey, The State of XOps Report, Q2 2020, reveals that organizations using software to help IT and InfoSec teams collaborate and align are three times more confident in the effectiveness of their information security efforts. 

from Cyber Security News https://ift.tt/3cdbwlI

Tuesday, 5 May 2020

91% of People Know Password Reuse is Insecure, Yet 75% do it Anyway

Data from a new LastPass survey shows that 91% of people know that using the same password on multiple accounts is a security risk, yet 66% continue to use the same password anyway.



from Cyber Security News https://ift.tt/3cdfFG8

Risk Ledger Report: Impact of the COVID-19 Crisis on Supply Chain Security

Risk Ledger, London-based cybersecurity company, part of the UK's Government's LORCA program, has produced a white paper designed to guide professionals who manage supply chain risks on how to tackle the situation.

from Cyber Security News https://ift.tt/3c4cu3s

CISA and NCSC Publish Advisory on APT Groups Targeting Healthcare and Essential Services

The US Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (NCSC) have released a joint advisory that highlights ongoing activity by APT groups against organizations involved in both national and international COVID-19 responses.

from Cyber Security News https://ift.tt/3bbaJAa

Information Security Forum Releases Updated Guide to Security Best Practices

The Information Security Forum (ISF) has published a major update to its Standard of Good Practice (The Standard) for IT security professionals. The guide delivers comprehensive coverage of information security controls and information risk-related guidance, providing ISF Members with a set of good practice covering all aspects of security strategy, incident management, business continuity, cyber resilience and risk management.



from Cyber Security News https://ift.tt/2W59OwV

GoDaddy Confirms Data Breach - 28,000 Customers Affected

GoDaddy, one of the world’s largest domain registrar and a web hosting company that provides services to roughly 19 million customers around the world, has confirmed a data breach.

from Cyber Security News https://ift.tt/3diwnUE

76% of Cybersecurity Leaders Face Skills Shortage

The latest findings of the Stott and May Cyber Security in Focus research reveal that leaders are still struggling with the skills gap and access to talent. Most respondents (76 percent) believe there is a shortage of cybersecurity skills in their company.

from Cyber Security News https://ift.tt/2W8BZLG

Cloud Computing: One Size does not Fit All

Whether you’re sending a teen or a college student off or heading back to school yourself, you need a reliable, portable laptop to take along. You’ll need it for taking notes, for checking class schedules, for turning in homework virtually, and for networking with everyone back home. Keep these 7 tips in mind as you shop for the ideal back-to-school laptop.

  1. Portability

It’s a no-brainer, really. You may long for that massive, heavy gaming laptop, but you don’t want to lug it around campus. Choose a laptop that is built for portability─ lightweight and compact.

  1. Storage Options

Not only do you need space for your homework documents, class spreadsheets, and other school-related data, but you will want some room for personal photos and videos. Pick a laptop that has plenty of hard drive space, as well as room for expansion if you need it. Be aware that some laptops, like the Chromebook, contain no hard drive. You have to have constant internet access to use these models.

  1. A Good Name

Avoid choosing the cheapest option simply because of the price tag. Stick with well-known, respected brands like Dell, Lenovo, Acer, HP, and Apple. These and a few other manufacturers are known for turning out high-quality, reliability laptops, geared for students and business users.

  1. The Cool Factor

You’re going back to high school or college, so the cool factor is definitely a plus. Apple has the corner on cool with many users, but you’ll find other good-looking machines that blend style with serviceability. And remember, you can always purchase an awesome laptop sleeve or a fashionable laptop bag to boost your style points.

  1. Keyboard Ergonomics

Chances are, you’ll be doing a lot of typing. Taking notes in class, creating reports, communicating with friends and teachers─ that’s a lot of hours for your fingers to log on the keyboard. Before you buy a particular model of laptop, test it out to ensure that your hands feel comfortable and your wrists are adequately supported. You can purchase additional accessories like wrist rests and an ergonomic mouse if necessary.

  1. Battery Life

You may be tempted to buy a used laptop and save money. However, be sure to ask about the battery for the laptop. When you’re in class typing up the notes for an upcoming exam, the last thing you want to worry about is your laptop’s dwindling battery power. Make sure that you purchase a laptop with a long-running battery, preferably with several hours of use per charge. The MacBook, Macbook Air, Dell Inspiron 3000, Lenovo Yoga, and HP Spectre lines all rank highly for battery life.

As you consider all these important qualities, remember to take into account all the hardware-related factors as well─ RAM, processor quality, graphics card potential, and screen size. If you’re unsure what you need, test out some friends’ laptops to get a feel for the available options. Take a tech-savvy friend with you on your hunt for the ideal back-to-school laptop for your lifestyle.



from We Hate Malware https://ift.tt/2A3y4ai

Digital Shadows Report: Competitions on English-Language Cybercriminal Forums

In contrast to the competitions on Russian-language cybercriminal forums profiled previously by Digital Shadows, how are competitions on English-language cybercriminal forums more generally "innocent"? 



from Cyber Security News https://ift.tt/2zfvhdr

Therace Risch Named SVP, Chief Information & Technology Officer at AEP

American Electric Power has named Therace Risch to a new position as senior vice president and chief information & technology officer.



from Cyber Security News https://ift.tt/2W4dwqA

Monday, 4 May 2020

Utility Commissioners Briefed on Cyberspace Solarium Report Recommendations to Boost Security of Critical Infrastructure

State utility commissions can strengthen the cybersecurity of U.S. critical infrastructure – particularly the electric grid – by advancing several relevant recommendations of the Cyberspace Solarium Commission report.

from Cyber Security News https://ift.tt/3b6qsAs

What's Next: The Future of Big Cybersecurity Conferences

The old curse has come true: we are “living in interesting times.” None of us could have possibly foreseen the way that 2020 has evolved, least of all, conference professionals. Gartner says it’s taking a $158 million hit in its Q2 revenues; O’Reilly went one huge step further, permanently shuttering its in-person events business. Aside from those gatherings, an entire slew of security meetings has moved into the virtual realm. In-person conferences during the pandemic are seen as being too hazardous and unsafe. It's now better to meet online than to risk spreading the virus.

from Cyber Security News https://ift.tt/3dgJZQb

Adult Live-Streaming Website Leaks 10.88 Billion Records

SafetyDetective's security research team, led by Anurag Sen, has discovered a significant data leak stretching into 10 billion records at adult live-streaming website CAM4.com, belonging to Irish company Granity Entertainment.

from Cyber Security News https://ift.tt/2W4JFhH

85% of Chief Information Officers Admit Weaknesses in IT Networks during Coronavirus

Millions of U.S. businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks, according to a new report. The research from Tanium, provider of unified endpoint management and security built for the world's most demanding IT environments, reveals that nearly three-quarters (72 percent) of US CIOs find previously undiscovered computing devices on a daily or weekly basis.  

from Cyber Security News https://ift.tt/2yu1DRJ

Preventing Scripting Attacks on Powershell with Identity-Based Zero Trust

The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat.

from Cyber Security News https://ift.tt/3c7qB8c

President Trump Bans Acquisition of Foreign Power Grid Equipment due to Cybersecurity Threats

Due to increased cybersecurity threats, President Donald Trump signed an executive order banning U.S. power grid entities from buying and installing electrical equipment that has been manufactured outside the U.S.

from Cyber Security News https://ift.tt/2yrF5RB

NGA Selects 7 States to Focus on Advancing Statewide Cybersecurity

The National Governors Association (NGA) selected seven states — Colorado, Michigan, Mississippi, New York, Oregon, Pennsylvania and Tennessee — to participate in a new project focused on implementing best practices on advancing statewide cybersecurity.



from Cyber Security News https://ift.tt/35sZlOQ

Sunday, 3 May 2020

SEL and University of Idaho Launch $2.5M Cybersecurity Partnership

Cybersecurity education and research in the Pacific Northwest is receiving a $2.5 million infusion due to a partnership between global power systems protection leader Schweitzer Engineering Laboratories (SEL) and the University of Idaho College of Engineering.

from Cyber Security News https://ift.tt/3b2uiL3

CISA Launches Telework Best Practices Site

The Cybersecurity and Infrastructure Security Agency (CISA) has launched a website dedicated to the needs of companies and individuals who have adopted teleworking.



from Cyber Security News https://ift.tt/3danFYw

Friday, 1 May 2020

Tips To Keep Your Data Safe

Daily use of computers has expanded exponentially in the last few years, and more and more people are using their computers and smartphones to do a ton of their daily day to day tasks, shopping, communication, and entertainment.  All the data being passed through your computer and over the internet leaves more and more opportunities for that data to get scooped up, stolen, or lost.  In order to protect yourself and your data there are a few tips that you can easily employ in your day to day habits.

Back Up Your Data

This is actually my first tip because it can really save your butt if anything goes wrong.  If your computer falls victim to a virus or malware (or even a dreaded ransomware) then you can easily just reset your computer and start from scratch.  You won’t have to worry about losing your valuable data, photos, documents, and videos.  These will all be safe.  I highly recommend a two pronged data backup strategy.  A local backup on a removable hard disk and a cloud based backup.  This will give you a local backup for fast access as well as an off site backup in case of an event where your hard drive breaks or gets destroyed or stolen along with your computer.  Internet speeds have improved so much and cloud based backup plans are unlimited and very cheap (you can get a great plan from Backblaze for $5).  It’s almost a liability NOT to have one.  And in my own personal experience, Backblaze saved my butt when my hard drive failed.

Employ Antivirus And Antimalware software

Having an antivirus software program on your computer is an absolute must.  If you don’t have that as a bare minimum, you’re really asking for it.  I recommend Norton 360 as a lightweight, active protection system.  In addition you might want to use an antimalware software program in order to get rid of programs that can subtly slip by Norton because they are acting like legitimate programs.  This includes adware and spyware.  I had a run-in with the Conduit adware and Spyhunter 4 cleared it right up.

Avoid Internet Bad Neighborhoods

Although even high-profile and secure websites can still fall victim to hacking, most of the time viruses and malware are most prolific in internet bad neighborhoods.  These include adult sites, gambling sites, hacking sites, free software and download sites, and torrent sites.  It seems that any time you venture over to sites like these you get a virus or some weird infection on your computer.  Avoid sites like this altogether, and if you simply must go to them you might want to just get a cheap netbook dedicated to that stuff.

Update Your Software

When you get a notification that a software program has an update available, always do it as soon as you can.  Most of the time these software updates are for patching security holes.  This is especially true when the update is for your internet browser, Adobe Flash, or any program that you use that connects to the internet.  Enabling automatic updates is a great way to not mess this up.

Stay Up To Date

Reading security blogs for the latest in terms of internet and data security is a great way to educate yourself.  If you know what to watch out for you’ll have an easier time avoiding things like email phishing scams and other tricks.  Once you learn more and more about the patterns that make these things evident you’ll be much better able to identify such things in the future.

Do you have any tips for our readers?  Leave a comment below!

 



from We Hate Malware https://ift.tt/35mxTlW