Thursday, July 9
How to use the Google Pixel Safety Check feature
Cyber Security, Free, Guide, How-to Tips, Resources, Safety Security

How to use the Google Pixel Safety Check feature

The Android-powered Google Pixel line of phones received a very important updated feature dedicated to user's personal safety. Learn how to use the Safety Check feature. Image: Sarah Tew/CNET Recent updates to Android 10 on the Google Pixel line of smartphones have brought a number of really interesting features to the platform; one such feature is the Personal Safety app. With this new entry into the Android ecosystem, you are able to ensure your emergency contacts can be apprised of your whereabouts and if there's cause to be concerned.Those emergency contacts could be love...
Business climate may be stabilizing for tech companies
Cyber Security, Free, How-to Tips, Resources, Safety Security, Senior Aging, Virus

Business climate may be stabilizing for tech companies

New CompTIA poll finds members are receiving inquiries around cybersecurity, migrating to the cloud, and managed services. Image: claffra, Getty Images/iStockphoto Technology companies continue to see customer interest in cybersecurity, cloud computing and other areas, perhaps indicating that the business environment is stabilizing, according to a new survey by CompTIA, a nonprofit trade association for the global tech industry.Eighty-four percent of respondent tech firms reported in June receiving new customer inquiries and business opportunities up from 76% in March, CompTI...
Zoom: We’ve delivered on all of our security and privacy promises, apart from one
Cyber Security, Free, Parents Family, Privacy Data Protection, Resources, Safety Security

Zoom: We’ve delivered on all of our security and privacy promises, apart from one

CEO Eric Yuan said the company had been working to improve safety, privacy and security, but has pushed back the date for its transparency report. The meteoric rise of videoconferencing platform Zoom during the global lockdowns was accompanied by criticism of its cybersecurity standards. As more remote workers turned to Zoom for business meetings, virtual get-togethers and other forms of socially distanced communication, it soon became apparent that security –thanks to headaches such as a wave of ' Zoom-bombing ' – was an area that needed more work. As a result, Zoom CEO Eric Yuan launched a 90-day programme that pledged to addre...
US schools have lost 24.5 million records in breaches since 2005
Breach Hack, Cyber Crime, Cyber Security, Free, How-to Tips, Phsihing Spam, Privacy Data Protection, Resources, Safety Security

US schools have lost 24.5 million records in breaches since 2005

A report from Comparitech found that since 2005 K–12 districts and colleges/universities have been attacked more than 1,300 times. gustavofrazao, Getty Images/iStockphoto A report from Comparitech has looked into cyberattacks on educational institutions in the United States, finding that there have been more than 1,300 breaches since 2005 and more than 24 million records lost.  Comparitech data researcher Sam Cook dug deeper into the data and discovered that every state besides Wyoming has reported at least one breach since 2005, with California and Arizona suffered from the ...
Trojans, backdoors, and trojan-droppers among most analyzed cyberthreats
Breach Hack, Cyber Security, Free, Malware Ransomware, Phsihing Spam, Resources, Safety Security, Tools Apps Software, Virus

Trojans, backdoors, and trojan-droppers among most analyzed cyberthreats

Almost three quarters of all requests for analysis to Kaspersky's Threat Intelligence Portal were for trojans, backdoors, and droppers. Image: Getty Images/iStockphoto Organizations and individuals must grapple with a variety of cyberthreats and malware from phishing attacks to ransomware to viruses to trojans and more. One free resource that can identify and analyze potential threats is Kaspersky's Threat Intelligence Portal. By entering a hash, IP address, domain, or URL, users can find information on the associated website or file to determine whether it's malicious. Among...
This Week in Security News: Intel Says ‘Tiger Lake’ Will Drown Control-Flow Malware and New Phishing Campaign Targeting Office 365 Exploits Brand Names
Breach Hack, Cyber Security, Free, Malware Ransomware, Phsihing Spam, Safety Security, Scams Fraud, Tools Apps Software

This Week in Security News: Intel Says ‘Tiger Lake’ Will Drown Control-Flow Malware and New Phishing Campaign Targeting Office 365 Exploits Brand Names

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how the next generation of Intel mobile processors will include malware protection built into the chip. Also, read about a new phishing campaign that uses brand names to bypass security filters and trick victims into giving up Microsoft Office 365 credentials to gain access to corporate networks. Read on: Intel Says ‘Tiger Lake’ Will Drown Control-Flow Malware Announced this week, the next generation of Intel mobile processors will include malware protection built into the chip. The protection, provided by Intel’s Control-Flow Enforcement Technology (CET), will first be available in the company’s “Tiger Lake” mob...
The Fear of Vendor Lock-in Leads to Cloud Failures
Cyber Security, Free, Resources, Safety Security, Tools Apps Software

The Fear of Vendor Lock-in Leads to Cloud Failures

  Vendor lock-in has been an often-quoted risk since the mid-1990’s. Fear that by investing too much with one vendor, an organization reduces their options in the future. Was this a valid concern? Is it still today?   The Risk Organizations walk a fine line with their technology vendors. Ideally, you select a set of technologies that not only meet your current need but that align with your future vision as well. This way, as the vendor’s tools mature, they continue to support your business. The risk is that if you have all of your eggs in one basket, you lose all of the leverage in the relationship with your vendor. If the vendor changes directions, significantly increases their prices, retires a critical offering, the quality of their product drops, or if any number of other sc...
Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations
Cyber Security, Free, How-to Tips, Identity Theft, Resources, Safety Security, Tools Apps Software

Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations

  Trend Micro is excited to launch new Trend Micro Cloud One™ – Conformity capabilities that will strengthen protection for Azure resources.   As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart, with a proven track record of success in the development of software systems that are resilient to failure and grow and scale dynamically through cloud, open-source, agile, and lean disciplines. In the interview, we picked Mike’s brain on how these new capabilities can help customers prevent or easily remediate misconfigurations on Azure. Let’s dive in.   What are the common business problems that customers encounter when building on or moving their applications to Azure or...
8 Cloud Myths Debunked
Cyber Security, Free, How-to Tips

8 Cloud Myths Debunked

Many businesses have misperceptions about cloud environments, providers, and how to secure it all. We want to help you separate fact from fiction when it comes to your cloud environment. This list debunks 8 myths to help you confidently take the next steps in the cloud.
This Week in Security News: XORDDoS and Kaiji Botnet Malware Variants Target Exposed Docker Servers and Ripple20 Vulnerabilities Could Impact Millions of IoT Devices
Addiction, Breach Hack, Cyber Security, Free, Gaming, Guide, How-to Tips, Malware Ransomware, Resources, Safety Security, Virus

This Week in Security News: XORDDoS and Kaiji Botnet Malware Variants Target Exposed Docker Servers and Ripple20 Vulnerabilities Could Impact Millions of IoT Devices

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about two recently detected variants of existing Linux botnet malware types targeting exposed Docker servers. Also, read about a group of vulnerabilities dubbed Ripple20 that have the potential to critically impact millions of IoT devices across many different industries. Read on: The Fear of Vendor Lock-in Leads to Cloud Failures Vendor lock-in, the fear that by investing too much with one vendor an organization reduces their options in the future, has been an often-quoted risk since the mid-1990s. Organizations continue to walk a fine line with their technology vendors. Ideally, you select a set of technologies that ...