Friday, July 3
#Hashtag Marketing Tracking [Video]
Addiction, Advertising, Business, Children Teens, Dr Don ICFO, Free, How-to Tips, Keywords, Marketing, Parents Family, Reviews, Social Media

#Hashtag Marketing Tracking [Video]

What Are #Hashtags A hashtag, introduced by the number sign, or hash symbol, #, is a type of metadata tag used on social networks such as Twitter and other microblogging services. It lets users apply dynamic, user-generated tagging that helps other users easily find messages with a specific theme or content. Wikipedia Why Are #Hashtags So Darn Important? By Nancy Taylor • June 12, 2015 You’ve all seen the ubiquitous # (hashtag) sign in front of social media posts, but do you really know what that symbol does—or could do for you? In case you’re reluctant to raise your hand in front of friends, co-workers or conference attendees, here’s a quick primer about the hashtag. What is a Hashtag? A hashtag is a label used on social media sites that makes it easier to find posts or in...
Microsoft Patch Tuesday, June 2020 Edition
Cyber Security

Microsoft Patch Tuesday, June 2020 Edition

Microsoft today released software patches to plug at least 129 security holes in its Windows operating systems and supported software, by some accounts a record number of fixes in one go for the software giant. None of the bugs addressed this month are known to have been exploited or detailed prior to today, but there are a few vulnerabilities that deserve special attention — particularly for enterprises and employees working remotely. June marks the fourth month in a row that Microsoft has issued fixes to address more than 100 security flaws in its products. Eleven of the updates address problems Microsoft deems “critical,” meaning they could be exploited by malware or malcontents to seize complete, remote control over vulnerable systems without any help from users. A chief co...
Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com
Cyber Security

Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com

For the past year, a site called Privnotes.com has been impersonating Privnote.com, a legitimate, free service that offers private, encrypted messages which self-destruct automatically after they are read. Until recently, I couldn’t quite work out what Privnotes was up to, but today it became crystal clear: Any messages containing bitcoin addresses will be automatically altered to include a different bitcoin address, as long as the Internet addresses of the sender and receiver of the message are not the same. Earlier this year, KrebsOnSecurity heard from the owners of Privnote.com, who complained that someone had set up a fake clone of their site that was fooling quite a few regular users of the service. And it’s not hard to see why: Privnotes.com is confusingly similar in name...
FCC Designates Huawei & ZTE as National Security Threats
Cyber Security

FCC Designates Huawei & ZTE as National Security Threats

Backdoors in 5G network equipment from these vendors could enable espionage and malicious activity, agency says.The US Federal Communications Commission (FCC) Tuesday formally designated China's Huawei and ZTE Corp. as national security threats, citing their close relationship with the Chinese government. The decision means that US carriers can no longer use money available under the FCC's Universal Service Fund (USF) to purchase 5G — or any other — equipment, services, or systems from either of the two Chinese equipment manufacturers or any of their subsidiaries and affiliates. The US Department of Defense and other government agencies previously announced decisions to discontinue use of technologies from Huawei and ZTE equipment from their networks. “Both companies have close ties to the...
COVID-19: Latest Security News & Commentary
Cyber Security

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. ') } else document.write('') Image Source: CDC Newsroom Image library 07/01/2020Another COVID-19 Side Effect: Rising Nation-State Cyber ActivityWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. 06/30/2020COVID-19 Puts ICS Security Initiatives 'On Pause'Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk. CISA Issues Advisory on Home RoutersThe increase in work-from-home employees raises the importance of home router security. Profile of the Po...
Apple tells app devs to use IPv6 as it’s 1.4 times faster than IPv4
Cyber Security

Apple tells app devs to use IPv6 as it’s 1.4 times faster than IPv4

Apple is encouraging developers to prioritize newer web technologies inside their iOS and macOS applications.In a short technical presentation at the WWDC 2020 conference last week, Apple shared some internal statistics in the hope of convincing app developers to adopt new web technologies and protocols, such as IPv6, HTTP/2, TLS 1.3, and Multipatch TCP.IPv6One of the newer technologies that Apple would like developers to implement is IPv6, the next iteration of the IP protocol, set to replace the older IPv4 version."Apple platforms have had native IPv6 support for a number of years, including support for IPv6-only networks," said Jiten Mehta, Internet Technologies Engineer at Apple....
One out of every 142 passwords is ‘123456’
Cyber Security

One out of every 142 passwords is ‘123456’

In one of the biggest password re-use studies of its kind, an analysis of more than one billion leaked credentials has discovered that one out of every 142 passwords is the classic "123456" string. The study, carried out last month by computer engineering student Ata Hakçıl, analyzed username and password combinations that leaked online after data breaches at various companies. These "data dumps" have been around for more than half a decade, and have been piling up as new companies are getting hacked. The data dumps are easily available online, on sites like GitHub or GitLab, or freely distributed via hacking forums and file-sharing portals. Over the years, tech companies have been c...
LinkedIn says iOS clipboard snooping after every key press is a bug, will fix
Cyber Security

LinkedIn says iOS clipboard snooping after every key press is a bug, will fix

iStock / Getty Images A LinkedIn spokesperson told ZDNet yesterday that a bug in the company's iOS app was responsible for a seemingly privacy-intrusive behavior spotted by one of its users on Thursday.The issue was discovered using the new beta version of iOS 14.For iOS 14, set to be officially released in the fall, Apple has added a new privacy feature that shows a quick popup that lets users know when an app has read content from their clipboard.Using this new mechanism, users spotted last week how Chinese mobile app TikTok was reading content from their clipboard at regular short ...
The next cybersecurity headache: Employees know the rules but just don’t care
Cyber Security

The next cybersecurity headache: Employees know the rules but just don’t care

Employees are still ignoring cybersecurity best practice despite being more aware of the risks. Cybersecurity has shot to the top of many IT leaders' priorities over the past few months as remote working became the de facto way of doing business. Yet despite more awareness of the security risks of working from home, employees are still showing a lax attitude when putting it into practice, according to new findings. Security firm Trend Micro surveyed more than 13,000 remote workers across 27 countries for its latest Head in the Clouds survey, which sought to understand individuals' attitudes towards risk in terms of cybersecurity. SEE: Mobile d...
Zoom: We’ve delivered on all of our security and privacy promises, apart from one
Cyber Security

Zoom: We’ve delivered on all of our security and privacy promises, apart from one

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report. The meteoric rise of videoconferencing platform Zoom during the global lockdowns was accompanied by criticism of its cybersecurity standards. As more remote workers turned to Zoom for business meetings, virtual get-togethers and other forms of socially distanced communication, it soon became apparent that security –thanks to headaches such as a wave of ' Zoom-bombing ' – was an area that needed more work. As a result, Zoom CEO Eric Yuan launched a 90-day programme that pledged to addre...
Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing
Cyber Security

Paul’s Security Weekly: New Web Technology & Impact on Automated Security Testing

Our core security researcher, Benjamin Daniel Mussler, has been invited to Paul’s Security Weekly podcast to participate in a discussion about new web technologies and their impact on automated security testing. Benjamin primarily talked about the fact that web browsers have gone a long way since serving static pages and web applications are becoming more and more like desktop applications. This means that the web browser is taking on the role of an operating system. The biggest challenges related to this are: Browsers will gain more and more access to the underlying operating system without user confirmation (for example, direct file system access). Therefore, web vulnerabilities may have even more serious implications on the client side. Security professionals must find ways to ...