On the surface, the internet seems to offer anything and everything you might need – on demand and for free. Children and teens especially enjoy the benefits of being able to download any song, film, book, computer program or app they want. However, even the internet has its limitations. What children consider free, might actually … More Kids & downloading. Is it safe?
The lottery’s operator has found that attackers probably used an automated method known as ‘credential stuffing’ to access up to 150 customer accounts. The United Kingdom’s National Lottery is advising all of its 10.5 million registered online users to change their passwords as a safety precaution following a security incident. The recommendation comes after the … More UK’s National Lottery urges millions of players to change their passwords
While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone
If you’re a security practitioner or long-time reader of this blog, you may be all-too-familiar with the dangers of practicing “checkbox security”. By blindly following rules and directives without appreciating why they’re important, you may make short-term gains while ultimately dooming your long-term goals. That being the case, you may intuitively understand why “checkbox diversity” measures are … More How diversity in cybersecurity contributes to your company
Gone are the days of chain letters! Back then, all victims of fabricated falsehoods had to lose was time and possibly a few bucks for stamps. Compared to these old-school hoaxes, there’s much more at stake with their modern cousins – often designed well enough to manipulate their audience into doing something without even realizing it. … More Can you spot a hoax in the flood of news? Can your children?
Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because … More How to start analyzing the security of your IoT devices
Researchers claim to have devised a way of browsing the web that “patches security holes left open by web browsers’ private-browsing functions”, reads the press announcement by the Massachusetts Institute of Technology (MIT). The newly-proposed method, aptly called ‘Veil’, may thus be of interest for web users who wish not to leave any trace of their browsing … More Researchers unveil Veil to make ‘private browsing more private’