Everyone needs certain skills to survive in today’s digital world. Adults tend to acquire them as new technologies come along, but today’s children are practically born with a smartphone in their hand. It’s up to parents to teach them how to exist in a world of constant information bombardment. Here show more ...
are seven habits that will help your children adapt to the Web. 1. Schedule time without devices When children spend a lot of time using technology, they can get addicted to it. According to researchers from the American Academy of Child & Adolescent Psychiatry, this addiction can lead to sleep problems, mood shifts, weight gain, poor self-image, and body-image issues. Experts suggest introducing children to today’s online world by gradually increasing their screen time and removing restrictions. Some tips also apply to children of any age: The simplest and most effective include not using devices close to bedtime and silencing devices overnight. You should also agree on other times when kids are not allowed to use their phone, such as during family meals. 2. Take charge of charging Although technology is advancing at lightning speed, today’s devices still run out of power quickly. You can kill two birds with one stone at bedtime by having children leave their devices charging somewhere outside of their bedroom such as in the entryway or kitchen — the device will always be charged in the morning, and your children won’t be able to watch TikTok trends right before bedtime. Keep in mind that children tend to use their devices so much during the day that by the time evening rolls around, the phone battery is probably dead. If that’s the case in your household, consider buying portable chargers for your children, and get them into the habit of taking the chargers when they’ll be out for long. 3. Pay attention to information security and more When children are immersed in the virtual world, they are susceptible to a host of dangers, both on the Web and in the real world. Start by stressing to them that they should not be staring at their phones while they’re crossing the street or walking up or down stairs. Next up is online safety including Internet threats such as scams, theft of personal data, viruses, and much more. Tell your children not to visit suspicious websites (and teach them what that means), enter passwords or any personal information there, open strange-looking links, or download apps from anywhere but the official app stores. Emphasize that they should never share personal documents, credit card information, or photos that could put them or their friends in a compromising position. It is unlikely that children will remember and follow all of those rules right off the bat. To get help, you can turn to a reliable security solution. For example, Kaspersky Internet Security protects devices from viruses, phishing, and online scams, and Kaspersky Safe Kids helps shield children from dangerous content and limit the amount of time they spend on their devices. 4. Aim for sustainable media consumption When our devices are constantly sending notifications, we can easily get overwhelmed and lose our concentration. Even adults sometimes have a hard time fighting the temptation to check messages, so you can imagine how difficult it is for kids. Limit the alerts on your children’s phones so they don’t get distracted from schoolwork or other tasks — and so they can finish their homework faster. Unfortunately, you can’t get rid of notifications from all apps on all devices at once; you need to configure them separately on phones and laptops, and every operating system has its own specific features and built-in tools for doing so. We have some posts that can help you manage notifications: How to turn off notifications in iOS and iPadOS How to configure notifications in Android Getting rid of browser notifications 5. Follow digital etiquette Just as in the real world, unspoken rules govern Internet behavior. People usually master them simply by communicating online, but children need help avoiding awkward situations, so you should discuss certain expectations with them before they go online. For example, discuss the differences between communicating over e-mail, on social networks, and in messaging apps. It’s also important to explain acceptable behavior. One rule of thumb is to ask before posting — every time — would I say this in person? Writing insults and demeaning people online is more than rude; it can be consequential. 6. Organize information Some say an organized phone or computer reflects an organized mind. A messy closet probably doesn’t really affect your child’s life, but losing passwords or files or forgetting phone numbers can be a problem. Kids should learn to organize information from an early age. Better yet, they should get in the habit of making backup copies of their most critical information. Make the most of external drives — flash drives or hard drives — or cloud storage. The latter is an important topic worth discussing separately. The cloud is a great resource, but children need to be cautious with it. They especially need to be careful not to allow just anyone access to important files. 7. Schedule a regular digital detox With digital technology infiltrating almost every aspect of children’s lives, it’s virtually impossible to avoid information overload. That means children need to be able to step away and make the Internet a less important part of their lives — first with your help and then on their own. First and foremost, limit the use of social networks — they tend to be the biggest drain on time and energy. The post “Eight steps to freedom: How to detach from social networks” has useful tips to help you and your children with this. A more effective, although also more complicated, way to combat information overload is the digital detox, when you put away your devices for a certain amount of time. For best results, do this on a regular basis. You can combine detoxes with nature excursions, exercise, or activities with friends — no devices allowed. The digital age has forced parents to confront brand-new challenges. As you deal with them, remember that you can be the best example for your children. It will be challenging to follow these rules at first, but over time they’ll become ingrained and will help your children reconnect with the world around them.
We talk with Casey Ellis, founder and CTO of BugCrowd about how the market for software bugs has changed since the first bug bounty programs emerged nearly 20 years ago, and what’s hot in bug hunting in 2021. The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security show more ...
Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight: When Ransomware Comes CallingEpisode 226: The Cyber Consequences Of Our Throw Away CultureSpotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion
The vulnerability affects the Windows versions of Kaspersky Anti-Virus, Internet Security, Total Security, Small Office Security, Security Cloud, and Endpoint Security products.
Two weeks after a newspaper discovered a security flaw on a state website, Gov. Mike Parson’s administration has hired a company that performs data breach and credit monitoring services.
Since Friday, visitors to Cyberserve-hosted websites have been experiencing website difficulties or receiving messages saying that the website is unavailable due to a cybersecurity event.
According to the Ransomware Task Force, ransomware recovery efforts can last an average of 287 days. The biggest claimed defense to ransomware attacks—backups— can also often fail.
Last week, Groove’s darknet blog disappeared. In a post on the Russian hacking forum XSS, a user explained that Groove was little more than a pet project to screw with the media and security industry.
In October, law enforcement made 16 arrests in relation to Mekotio and the Grandoreiro Trojans across Spain. The suspects allegedly sent thousands of phishing emails to distribute the Trojan.
Cybersecurity firm SecureAuth has purchased Acceptto to better understand whether a user poses a threat before, during, and following authentication by leveraging behavioral modeling.
BlackMatter operates a private ransomware-as-a-service (RaaS) website that affiliates can use to communicate with the core operators, open support tickets, and receive new ransomware builds.
There’s a fresh, active scam circulating in Discord right now that is propagated by either bot accounts or accounts controlled by scammers. Discord users are directed to a spoofed Discord page.
Access is usually obtained through flaws in Remote Desktop Protocol (RDP), virtual private networks (VPN), Citrix, SonicWall, misconfigurations, and brute-force attacks, as well as credential theft.
The directive aims to protect citizen privacy and personal data, prevent monetary fraud risks, and ensure better resilience of communication networks, according to the executive branch of the EU.
Intended to provide admins with the necessary information for prioritizing and deploying patches, the CVE system was devised at a time when nearly all enterprise software was running on-premises.
Microsoft 365's Jon Maunder said its "specially built to bring enterprise-grade endpoint security to businesses with up to 300 employees, in a solution that is easy-to-use and cost-effective."
The cybersecurity body reiterated that there is "no specific, credible threat to election infrastructure" but noted that they are "ready to provide cyber incident response and expertise if needed."
A new study by Javelin Strategy & Research found that children who use Twitch (31%), Twitter (30%), and Facebook (25%) were most likely to have their personal information exposed in a data breach.
Researchers assess with moderate confidence that the initial infection vector is the exploitation of ProxyShell flaws in Microsoft Exchange Server through the deployment of China Chopper web shell.
The LFX Security module now includes automatic scanning for secrets-in-code and non-inclusive language, adding to its existing comprehensive automated vulnerability detection capabilities.
The server, which did not have any authentication controls in place and was accessible by anyone to view, contained 157GB of data, or just under an estimated 200,000 files.
The quintet of flaws, discovered by a team from German security consultancy Enable Security, lead to denial of service, authentication problems, and information leakage for systems running FreeSwich.
FortiGuard Labs found a Chaos ransomware variant being circulated on Japanese Minecraft forums. While this variant encrypts certain files, it completely destroys some. Gamers are recommended to stay alert while being offered such commodities on gaming forums.
Ransomware threats continue to be many criminals' weapon of choice for reliably shaking down victims small, medium, and large, in pursuit of a safe, easy and reliable payday.
The Confidential Computing Consortium’s new Gramine Project is introducing its production-ready version – Gramine 1.0 – to enable the protection of sensitive workloads with Intel SGX.
In a security advisory, Mozilla’s announced that several security issues in its Firefox browser have been fixed. Several of these vulnerabilities were listed as having a high impact.
Financial institutions will be required to explain their information-sharing practices and designate a single qualified individual to oversee their information security program.
CISA has issued this year's first binding operational directive (BOD) ordering federal civilian agencies to mitigate security vulnerabilities exploited in the wild within an aggressive timeline.
The FBI has issued a flash alert warning against the HelloKitty ransomware group who recently started threatening victims with DDoS attacks. The group's ransom demands fluctuate for each victim and are based on their ability to pay. Organizations should apply recommended mitigations at the earliest.
Rapid7 unearthed a malicious campaign targeting Windows 10 running on Chrome browsers. The objective of the campaign is to obtain sensitive data and steal cryptocurrency from the infected systems. Experts recommend avoiding visiting unknown sites and clicking on suspicious links.
Red Hat Security Advisory 2021-4122-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2021-4116-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.3.0 ESR. Issues addressed include bypass, spoofing, and use-after-free vulnerabilities.
Red Hat Security Advisory 2021-4112-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a use-after-free vulnerability.
Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
Red Hat Security Advisory 2021-4107-01 - Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2021-4106-01 - Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Issues addressed include a bypass vulnerability.
Fuel CMS version 1.4.1 remote code execution exploit. Original discovery of remote code execution in this version is attributed to 0xd0ff9 in July of 2019.
Red Hat Security Advisory 2021-4104-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
Facebook's newly-rebranded parent company Meta on Tuesday announced plans to discontinue its decade-old "Face Recognition" system and delete a massive trove of more than a billion users' facial recognition templates as part of a wider initiative to limit the use of the technology across its products. The Menlo Park tech giant described the about-face as "one of the largest shifts in facial
Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are
The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers
An analysis of new samples of BlackMatter ransomware for Windows and Linux has revealed the extent to which the operators have continually added new features and encryption capabilities in successive iterations over a three-month period. No fewer than 10 Windows and two Linux versions of the ransomware have been observed in the wild to date, Group-IB threat researcher Andrei Zhdanov said in a
For most organizations today, the logs produced by their security tools and environments provide a mixed bag. On the one hand, they can be a trove of valuable data on security breaches, vulnerabilities, attack patterns, and general security insights. On the other, organizations don’t have the right means to manage the massive scale of logs and data produced to derive any value from it. Log
The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers
Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are
Google's latest monthly security patches for the Android operating system contains fixes for 39 flaws, including one security vulnerability that the tech giant says is being actively exploited in the wild. Read more in my article on the Hot for Security blog.
The BlackMatter ransomware group, which just a month or two ago was asking internet users to stop bombarding it with insults as it attempted to negotiate payments from its corporate victims, appears to have announced that it is now closing down its operations. Oh dear, what a shame, never mind.