Social networks are the new playground for children. Most of the friending and socializing they do nowadays takes place online. Letting them use all the online socializing tools not only helps them develop social skills, but also provides them with tech skills from an early age. And they already seem pretty savvy, don’t they? But with all the benefits online socializing brings, is it really safe for kids?
Do you ever get emails promoting miraculous weight-loss pills or counterfeit Viagra? These are probably the spam emails that everyone’s heard of and that frequently land in our inboxes. And they are exactly the type of web content Spamhaus fights against.
(Once) The world’s greatest conman giving advice on how to protect yourself against Facebook scams? Now, that’s a bit controversial. But, come to think of it, who better to offer advice on how not to get scammed than a scam expert?
If you saw Steven Spielberg’s “Catch Me If You Can,” you probably know who I’m talking about.
Google seems to know everything and we trust it. Especially when it warns us: “Your account could be at risk of state-sponsored attacks,” we rush to the page where it provides us with internet security tips on how to protect ourselves and read every word, carefully and avidly. But wait! State-sponsored attacks?
Flawed communication is a common thing among us, humans. But when we talk machinery and software, we expect every process to be flawless. Unfortunately, as recent research data shows, they’re not. Vulnerability management company, Rapid7, released a whitepaper on one of the most pervasive software vulnerabilities discovered recently: a security hole in UPnP (Universal Plug and Play).
Last week, Facebook announced its latest functionality: the Facebook Graph Search. As Facebook changes its look and functionalities often, you’ve probably asked yourself: “Ok, what is Facebook doing now?” In a nutshell, Facebook tries to follow in Google’s footsteps to create a built-in search engine that allows you to find things and… PEOPLE, more easily, based on relationship and context. Surely, all you Facebook groupies can’t wait to test it out, but cybercrooks can’t either. How’s that? Well, let’s dig a bit deeper, shall we?
So the Mayans were wrong. We’ve survived their fatal predictions and yet another year has passed, leaving behind a chain of ever-evolving online threats. From massive hack attacks, rampant computer infections, mobile malware, spear-phishing attacks, malicious websites, spam zombies, to Facebook scams, online privacy invasions, even (and especially!) on Facebook and cyberbulling. The list may, of course, continue. But now that we’re about to enter a new year, what lessons are we drawing from this past one?
A week ago, a UK Government official advised web users to use fake details, names and other personal information when logging in to social media websites. His statement sparked controversy and was frowned upon by fellow politicians.
Viruses, Trojans and spyware do not care what device you use. Just go online, and the dangers threatening your mobile device are just as real as those threatening your PC.
Ever wondered what countries most attackers operate from?
Curious as to what types of attacks they prefer?
A recent study conducted by website security company Incapsula shows a quite interesting, yet worrying set of facts and stats. As it turns out, the United States and China gather the highest numbers of website attackers. And the most common attacks they perform are as follows:
Plugin by Social Author Bio