Thursday, July 9

Privacy Data Protection

Zoom: We’ve delivered on all of our security and privacy promises, apart from one
Cyber Security, Free, Parents Family, Privacy Data Protection, Resources, Reviews, Safety Security, Tools Apps Software

Zoom: We’ve delivered on all of our security and privacy promises, apart from one

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report. The meteoric rise of videoconferencing platform Zoom during the global lockdowns was accompanied by criticism of its cybersecurity standards. As more remote workers turned to Zoom for business meetings, virtual get-togethers and other forms of socially distanced communication, it soon became apparent that security –thanks to headaches such as a wave of ' Zoom-bombing ' – was an area that needed more work. As a result, Zoom CEO Eric Yuan launched a 90-day programme that pledged to addre...
Addiction to Romance Novels
Addiction, Cyber Security, Free, Privacy Data Protection, Rehab, Resources, Reviews, Sex Porn, Treatment

Addiction to Romance Novels

Romance, excitement, adventure, drama–romance novels lead the industry in book sales, but at what price? Addiction to romance novels is understood as a form of pornography addiction and, as such, also has porn addiction side effects. In some ways, it is easier to hide and has less social stigma, especially in the early stages of addiction. But addiction to romance novels can become as debilitating and damaging as addiction to pornography.Defining the AddictionIf you explore the romantic fiction blogosphere, you’ll find that many writers use the term addiction without qualms. Their blogs boast that their offerings will “feed your addiction,” but they miss the point. Addiction, and especially porn addiction side effects, can destroy families and cause harm. What’s the difference between bein...
Persistence Pays Off
Addiction, Cyber Security, Drugs Alcohol, Free, Privacy Data Protection, Resources, Tools Apps Software, Virus

Persistence Pays Off

Provided by SMART Family & Friends Facilitator, Kerry Hammell In the fall of 2018, I started the SMART Recovery Family & Friends meeting in Campbell River on Vancouver Island, B.C., Canada.  It quickly developed a regular following of 10-15 participants that often reported that the meetings were providing each of them with tremendous support and encouragement. Then came COVID-19 in March 2020.    Now, I am the first to admit to my almost total incompetence with technology.  So, getting on board with the suggested ZOOM meetings shook me to my core. However, every week I read out the opening meeting remarks referencing “Practice, Patience & Persistence,” and being a firm believer in ‘practice what you preach’, I knew I had to give it a go!  I had collected everyone’s contact in...
Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com
Cyber Security, Free, Parents Family, Phsihing Spam, Privacy Data Protection, Safety Security, Scams Fraud, Tools Apps Software

Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com

For the past year, a site called Privnotes.com has been impersonating Privnote.com, a legitimate, free service that offers private, encrypted messages which self-destruct automatically after they are read. Until recently, I couldn’t quite work out what Privnotes was up to, but today it became crystal clear: Any messages containing bitcoin addresses will be automatically altered to include a different bitcoin address, as long as the Internet addresses of the sender and receiver of the message are not the same. Earlier this year, KrebsOnSecurity heard from the owners of Privnote.com, who complained that someone had set up a fake clone of their site that was fooling quite a few regular users of the service. And it’s not hard to see why: Privnotes.com is confusingly similar in name...
Turn on MFA Before Crooks Do It For You
Addiction, Breach Hack, Children Teens, Cyber Security, Free, Games, Malware Ransomware, Privacy Data Protection, Safety Security, Tools Apps Software

Turn on MFA Before Crooks Do It For You

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here’s the story of one such incident. As a career chief privacy officer for different organizations, Dennis Dayman has tried to instill in his twin boys the importance of securing their online identities against account takeovers. Both are avid gamers on Microsoft’s Xbox platform, and for years their father managed their accounts via his own Microsoft ac...
FCC Designates Huawei & ZTE as National Security Threats
Cyber Security, Free, How-to Tips, Malware Ransomware, Privacy Data Protection, Safety Security, Senior Aging

FCC Designates Huawei & ZTE as National Security Threats

Backdoors in 5G network equipment from these vendors could enable espionage and malicious activity, agency says.The US Federal Communications Commission (FCC) Tuesday formally designated China's Huawei and ZTE Corp. as national security threats, citing their close relationship with the Chinese government. The decision means that US carriers can no longer use money available under the FCC's Universal Service Fund (USF) to purchase 5G — or any other — equipment, services, or systems from either of the two Chinese equipment manufacturers or any of their subsidiaries and affiliates. The US Department of Defense and other government agencies previously announced decisions to discontinue use of technologies from Huawei and ZTE equipment from their networks. “Both companies have close ties to the...
Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign
Addiction, Breach Hack, Cyber Security, Free, How-to Tips, Malware Ransomware, Parents Family, Privacy Data Protection, Safety Security, Senior Aging, Sex Porn, Tools Apps Software

Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign

Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says.Attackers recently compromised dozens of US newspaper websites belonging to the same parent company and used the sites to distribute malicious code for downloading ransomware on networks belonging to targeted organizations across multiple sectors. Several major US organizations that were recently found infected with the malware appear to have been initially compromised when their employees visited one of the news websites, Symantec said. The security vendor last week had reported discovering "SocGholish," a JavaScript-based malware masquerading as a software update, on networks belonging to at least 31 major enterprise customers. A Russia-based group called E...
COVID-19: Latest Security News & Commentary
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, Guide, How-to Tips, Identity Theft, Malware Ransomware, Marketing, Parents Family, Phsihing Spam, Privacy Data Protection, Resources, Safety Security, Scams Fraud, Senior Aging, Social Media, Tools Apps Software, Virus

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. ') } else document.write('') Image Source: CDC Newsroom Image library 07/01/2020Another COVID-19 Side Effect: Rising Nation-State Cyber ActivityWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. 06/30/2020COVID-19 Puts ICS Security Initiatives 'On Pause'Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk. CISA Issues Advisory on Home RoutersThe increase in work-from-home employees raises the importance of home router security. Profile of the Po...
Considerations for Seamless CCPA Compliance
Breach Hack, Cyber Security, Free, How-to Tips, Privacy Data Protection, Safety Security

Considerations for Seamless CCPA Compliance

Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act.The California Consumer Privacy Act (CCPA) went into effect at the beginning of the year, and the enforcement date of July 1 is just around the corner — with no signs of an extension. Organizations are beginning to feel the pressure to comply with the strict requirements that are designed to ensure that the collection, storage, and processing of personal data is consistent, secure, and noninvasive. Unfortunately, many are not ready to take on this new level of consumer privacy regulation, with 63% of respondents from a recent survey stating that working remotely has complicated maintaining compliance with the mandates that are applicable to their organization. Si...
Beware “secure DNS” scam targeting website owners and bloggers
Breach Hack, Cyber Security, Free, How-to Tips, Malware Ransomware, Phsihing Spam, Privacy Data Protection, Safety Security, Scams Fraud, Virus

Beware “secure DNS” scam targeting website owners and bloggers

If you run a website or a blog, you probably use a cloud provider or a dedicated hosting company to manage your server and deliver the content to your readers, viewers and listeners. We certainly do – both Naked Security and our sister site Sophos News are hosted by WordPress VIP. That’s not a secret (nor is it meant to be), not least because most providers identify themselves in the HTTP headers they send back in their web replies, if only as a matter of courtesy: $ getheaders https://news.sophos.com Connecting... OK. TLS handshake... OK. ---headers--- server: nginx date: Mon, 29 Jun 2020 10:21:21 GMT content-type: text/html; charset=UTF-8 content-length: 0 x-hacker: If you're reading this, you should visit wpvip.com/careers and apply to join the fun, mention this header...