Education is the cornerstone of our culture, as it allows us to progress as a society and we can share with the new generations values and knowledge that we consider essential. In an increasingly digitized society, and especially considering that children are using technology more and more at an earlier age, it is show more ...
crucial for education to focus on how to use this global tool safely. Technology offers great advantages in education, culture and entertainment, but also presents some risks that they need to know. The report “Why Children are Unsafe in Cyberspace” from the Global Cybersecurity Forum has found that 72% of children around the world have experienced at least one type of cyber threat online. This is very alarming because it can impact the mental and physical health, integrity and privacy of the youngest people. The report attests to the growing challenges faced in protecting children in cyberspace, especially in times when 90% of children over 8 years old are already active online but only 40% of their parents are aware that their child have experienced a cyber threat in the past. Check Point® Software Technologies Ltd., considers that even if the efforts to respond with increased awareness and implement new security measures are growing, they are still not enough. Cybersecurity Education The threats faced by children are very different and, in most cases, they are not aware of them and parents are clueless about these threats as well. It is therefore critical to take preventive measures now to ensure the protection of children online. These are some of the main measures to protect them: Learning cybersecurity through play: play is always a great tool to teach children, because when they learn having fun, they acquire concepts more effectively. In this way, practical exercises can be proposed that simulate threats so they will learn how to protect themselves. It is also possible to develop apps and online games to help them acquire this knowledge, recognize threats and know how to protect their personal data. Ethics as a banner: teaching cybersecurity always comes with an ethical component because it is very important to instill ethical principles for the development of future responsible citizens. The development of technological skills should come with a conscious use of them. Demystifying the hacker: it is essential that children understand all the complexities of this figure. A hacker can be a cybercriminal who causes harm to the computer systems but that there are also “good hackers” or “White hats” that use their computer knowledge ethically to identify potential system breaches or errors in companies and fix them to prevent attacks. Cybersecurity in the educational curriculum: one of the main strategies to prevent threats affecting minors is cybersecurity education in school. Cybersecurity is a pending subject in schools, and it would be very useful to raise awareness among children about risks and to teach them some tools to protect themselves. For this, it is crucial to have educators with digital knowledge and highly recommended that they offer such cybersecurity talks so that parents can also have some basic knowledge of how to help their child protect themselves online. Creating a secure network: children also need to know how to create secure networks to prevent potential threats, one of the most common being phishing. This threat lies in using emails to deceive people into clicking on malicious links or attachments. Sometimes, these emails are very difficult to detect, especially for children, because they appear to come from a familiar person, such as a friend or a family member. For this reason, it is necessary for them to learn how to detect when a cyberattack may be compromising their network, use secure passwords as an additional barrier, protect their social media where they spend a lot of hours on, and recognize phishing attacks. It is very harmful that children at such young ages are exposed to cyber risks, because it could jeopardize their emotional health, physical integrity and privacy”, explains Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East. “In this way, it is essential that children receive cybersecurity education to know how to identify threats and have tools to respond with. In this sense, kids can feel safer online, and at the same time we are building a more aware and responsible society in the use of new technologies”. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Source: securityaffairs.com – Author: Pierluigi Paganini Clorox estimates the costs of the August cyberattack will exceed $49 Million Pierluigi Paganini February 03, 2024 Cleaning products giant Clorox estimates the economic impact of the cyber attack that hit the company in August 2023 at $49 million. The show more ...
Clorox Company is a multinational consumer goods company that […] La entrada Clorox estimates the costs of the August cyberattack will exceed $49 Million – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Mastodon fixed a flaw that can allow the takeover of any account Pierluigi Paganini February 03, 2024 A vulnerability impacting the decentralized social network Mastodon can be exploited by threat actors to impersonate and take over any account. A show more ...
security flaw, tracked as CVE-2024-23832 (CVSS score 9.4), in the […] La entrada Mastodon fixed a flaw that can allow the takeover of any account – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Iranian hackers breached Albania’s Institute of Statistics (INSTAT) Pierluigi Paganini February 02, 2024 Albania’s Institute of Statistics (INSTAT) announced that it was targeted by a sophisticated cyberattack that affected some of its systems. A show more ...
sophisticated cyberattack on Wednesday hit Albania’s Institute of Statistics (INSTAT). The institute confirmed that the […] La entrada Iranian hackers breached Albania’s Institute of Statistics (INSTAT) – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Pandian Gnanaprakasam Authors: Pandian G, Gowri Sunder Ravi, Srinivas Loke Summary of Advisory from FBI/CISA Actors with malicious intentions, particularly the People’s Republic of China-backed Volt Typhoon group, are manipulating small office/home office (SOHO) routers show more ...
by exploiting software vulnerabilities that manufacturers need to address through secure software engineering. More specifically, the […] La entrada Ordr Security Bulletin – Volt Typhoon State-Sponsored Cyber Actor – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Sift Trust and Safety Team The first several months of the year are known as ‘chargeback season’ for fraud practitioners globally, as businesses navigate an increase in post-holiday purchase disputes. The latest Sift Digital Trust & Safety Index report covers the show more ...
current state of chargeback data and dispute trends, including consumer […] La entrada Dispute data, consumer insights, and emerging trends from 2023 – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cyberdefensemagazine.com – Author: News team By Mark Allen, Head of cyber, CloudCoCo As small and medium-sized enterprises (SMEs) embark on their digitalization journey, they face a crucial dilemma: Should they prioritize the adoption of cloud solutions or enhance their cyber security defences? Both show more ...
aspects are essential, but finding the perfect equilibrium can be a […] La entrada Striking The Right Balance: Cloud and Cyber Priorities for SMEs – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Microsoft is bringing the Linux ‘sudo’ feature to Windows Server 2025, offering a new way for admins to elevate privileges for console applications. Superuser do, or sudo, is a Linux console program that allows low-privileged users to show more ...
execute a command with elevated privileges, usually as root. This command offers […] La entrada Microsoft is bringing the Linux sudo command to Windows Server – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.bleepingcomputer.com – Author: Bill Toulas Four vulnerabilities collectively called “Leaky Vessels” allow hackers to escape containers and access data on the underlying host operating system. The flaws were discovered by Snyk security researcher Rory McNamara in November 2023, who show more ...
reported them to impacted parties for fixing. Snyk has found no signs of active exploitation of the […] La entrada Leaky Vessels flaws allow hackers to escape Docker, runc containers – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.