Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to help children ...

 Tips

Everyone needs certain skills to survive in today’s digital world. Adults tend to acquire them as new technologies come along, but today’s children are practically born with a smartphone in their hand. It’s up to parents to teach them how to exist in a world of constant information bombardment. Here   show more ...

are seven habits that will help your children adapt to the Web. 1. Schedule time without devices When children spend a lot of time using technology, they can get addicted to it. According to researchers from the American Academy of Child & Adolescent Psychiatry, this addiction can lead to sleep problems, mood shifts, weight gain, poor self-image, and body-image issues. Experts suggest introducing children to today’s online world by gradually increasing their screen time and removing restrictions. Some tips also apply to children of any age: The simplest and most effective include not using devices close to bedtime and silencing devices overnight. You should also agree on other times when kids are not allowed to use their phone, such as during family meals. 2. Take charge of charging Although technology is advancing at lightning speed, today’s devices still run out of power quickly. You can kill two birds with one stone at bedtime by having children leave their devices charging somewhere outside of their bedroom such as in the entryway or kitchen — the device will always be charged in the morning, and your children won’t be able to watch TikTok trends right before bedtime. Keep in mind that children tend to use their devices so much during the day that by the time evening rolls around, the phone battery is probably dead. If that’s the case in your household, consider buying portable chargers for your children, and get them into the habit of taking the chargers when they’ll be out for long. 3. Pay attention to information security and more When children are immersed in the virtual world, they are susceptible to a host of dangers, both on the Web and in the real world. Start by stressing to them that they should not be staring at their phones while they’re crossing the street or walking up or down stairs. Next up is online safety including Internet threats such as scams, theft of personal data, viruses, and much more. Tell your children not to visit suspicious websites (and teach them what that means), enter passwords or any personal information there, open strange-looking links, or download apps from anywhere but the official app stores. Emphasize that they should never share personal documents, credit card information, or photos that could put them or their friends in a compromising position. It is unlikely that children will remember and follow all of those rules right off the bat. To get help, you can turn to a reliable security solution. For example, Kaspersky Internet Security protects devices from viruses, phishing, and online scams, and Kaspersky Safe Kids helps shield children from dangerous content and limit the amount of time they spend on their devices. 4. Aim for sustainable media consumption When our devices are constantly sending notifications, we can easily get overwhelmed and lose our concentration. Even adults sometimes have a hard time fighting the temptation to check messages, so you can imagine how difficult it is for kids. Limit the alerts on your children’s phones so they don’t get distracted from schoolwork or other tasks — and so they can finish their homework faster. Unfortunately, you can’t get rid of notifications from all apps on all devices at once; you need to configure them separately on phones and laptops, and every operating system has its own specific features and built-in tools for doing so. We have some posts that can help you manage notifications: How to turn off notifications in iOS and iPadOS How to configure notifications in Android Getting rid of browser notifications 5. Follow digital etiquette Just as in the real world, unspoken rules govern Internet behavior. People usually master them simply by communicating online, but children need help avoiding awkward situations, so you should discuss certain expectations with them before they go online. For example, discuss the differences between communicating over e-mail, on social networks, and in messaging apps. It’s also important to explain acceptable behavior. One rule of thumb is to ask before posting — every time — would I say this in person? Writing insults and demeaning people online is more than rude; it can be consequential. 6. Organize information Some say an organized phone or computer reflects an organized mind. A messy closet probably doesn’t really affect your child’s life, but losing passwords or files or forgetting phone numbers can be a problem. Kids should learn to organize information from an early age. Better yet, they should get in the habit of making backup copies of their most critical information. Make the most of external drives — flash drives or hard drives — or cloud storage. The latter is an important topic worth discussing separately. The cloud is a great resource, but children need to be cautious with it. They especially need to be careful not to allow just anyone access to important files. 7. Schedule a regular digital detox With digital technology infiltrating almost every aspect of children’s lives, it’s virtually impossible to avoid information overload. That means children need to be able to step away and make the Internet a less important part of their lives — first with your help and then on their own. First and foremost, limit the use of social networks — they tend to be the biggest drain on time and energy. The post “Eight steps to freedom: How to detach from social networks” has useful tips to help you and your children with this. A more effective, although also more complicated, way to combat information overload is the digital detox, when you put away your devices for a certain amount of time. For best results, do this on a regular basis. You can combine detoxes with nature excursions, exercise, or activities with friends — no devices allowed. The digital age has forced parents to confront brand-new challenges. As you deal with them, remember that you can be the best example for your children. It will be challenging to follow these rules at first, but over time they’ll become ingrained and will help your children reconnect with the world around them.

image for Episode 229: BugCrow ...

 bounty

We talk with Casey Ellis, founder and CTO of BugCrowd about how the market for software bugs has changed since the first bug bounty programs emerged nearly 20 years ago, and what’s hot in bug hunting in 2021. The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security   show more ...

Ledger with Paul F. Roberts. Click the icon below to listen. Related StoriesSpotlight: When Ransomware Comes CallingEpisode 226: The Cyber Consequences Of Our Throw Away CultureSpotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

 Incident Response, Learnings

According to the Ransomware Task Force, ransomware recovery efforts can last an average of 287 days. The biggest claimed defense to ransomware attacks—backups— can also often fail.

 Identity Theft, Fraud, Scams

There’s a fresh, active scam circulating in Discord right now that is propagated by either bot accounts or accounts controlled by scammers. Discord users are directed to a spoofed Discord page.

 Expert Blogs and Opinion

Intended to provide admins with the necessary information for prioritizing and deploying patches, the CVE system was devised at a time when nearly all enterprise software was running on-premises.

 Security Products & Services

Microsoft 365's Jon Maunder said its "specially built to bring enterprise-grade endpoint security to businesses with up to 300 employees, in a solution that is easy-to-use and cost-effective."

 Trends, Reports, Analysis

A new study by Javelin Strategy & Research found that children who use Twitch (31%), Twitter (30%), and Facebook (25%) were most likely to have their personal information exposed in a data breach.

 Malware and Vulnerabilities

FortiGuard Labs found a Chaos ransomware variant being circulated on Japanese Minecraft forums. While this variant encrypts certain files, it completely destroys some. Gamers are recommended to stay alert while being offered such commodities on gaming forums.

 Trends, Reports, Analysis

Ransomware threats continue to be many criminals' weapon of choice for reliably shaking down victims small, medium, and large, in pursuit of a safe, easy and reliable payday.

 Malware and Vulnerabilities

In a security advisory, Mozilla’s announced that several security issues in its Firefox browser have been fixed. Several of these vulnerabilities were listed as having a high impact.

 Laws, Policy, Regulations

Financial institutions will be required to explain their information-sharing practices and designate a single qualified individual to oversee their information security program.

 Malware and Vulnerabilities

The FBI has issued a flash alert warning against the HelloKitty ransomware group who recently started threatening victims with DDoS attacks. The group's ransom demands fluctuate for each victim and are based on their ability to pay. Organizations should apply recommended mitigations at the earliest.

 Malware and Vulnerabilities

Rapid7 unearthed a malicious campaign  targeting Windows 10 running on Chrome browsers. The objective of the campaign is to obtain sensitive data and steal cryptocurrency from the infected systems. Experts recommend avoiding visiting unknown sites and clicking on suspicious links.

 Feed

Red Hat Security Advisory 2021-4122-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include buffer overflow, out of bounds write, and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2021-4116-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.3.0 ESR. Issues addressed include bypass, spoofing, and use-after-free vulnerabilities.

 Feed

Red Hat Security Advisory 2021-4112-01 - The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include a use-after-free vulnerability.

 Feed

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

 Feed

Facebook's newly-rebranded parent company Meta on Tuesday announced plans to discontinue its decade-old "Face Recognition" system and delete a massive trove of more than a billion users' facial recognition templates as part of a wider initiative to limit the use of the technology across its products. The Menlo Park tech giant described the about-face as "one of the largest shifts in facial

 Feed

Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are

 Feed

The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers

 Feed

An analysis of new samples of BlackMatter ransomware for Windows and Linux has revealed the extent to which the operators have continually added new features and encryption capabilities in successive iterations over a three-month period. No fewer than 10 Windows and two Linux versions of the ransomware have been observed in the wild to date, Group-IB threat researcher Andrei Zhdanov said in a

 Feed

For most organizations today, the logs produced by their security tools and environments provide a mixed bag. On the one hand, they can be a trove of valuable data on security breaches, vulnerabilities, attack patterns, and general security insights. On the other, organizations don’t have the right means to manage the massive scale of logs and data produced to derive any value from it.  Log

 Feed

The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers

 Feed

Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are

 Law & order

The BlackMatter ransomware group, which just a month or two ago was asking internet users to stop bombarding it with insults as it attempted to negotiate payments from its corporate victims, appears to have announced that it is now closing down its operations. Oh dear, what a shame, never mind.

2021-11
Aggregator history
Wednesday, November 03
MON
TUE
WED
THU
FRI
SAT
SUN
NovemberDecemberJanuary