Kids & Mobile Use [INFOGRAPHIC]

kids-mobile-useA BullGuard survey of 2,000 parents with children between the ages of 7 and 14 revealed that one in seven parents had discovered something unsuitable on their kid’s smartphone or tablet.

The survey on mobile usage revealed just how concerned parents are and also at the same time how they sometimes feel powerless. For instance, stranger danger is the #1 concern with parents expressing understandable anxiety about their children being ‘courted’ by people they don’t know.

Read more


Point-of-sale (PoS) Hacks

PoSJust before Christmas last year the mother of all hacks took place in the US. Target, a retailer which sells everything from kid’s swings and outdoor flooring to curling irons and razor sharp HD smart TVs had its point of sales (PoS) systems hacked.

Information from up to 40 million customer’s credit and debit cards was lifted by hackers. Within days, this information started appearing on underground web sites which specialize in this type of information. Some of the credit card details were going for about $20 each.  So worried were the banks that some of them even dived into the deep web and bought up the credit/debit card information to protect their reputation and their customer’s bank accounts.

Read more


Neiman Marcus Data Breach

Data breachIn January, Neiman Marcus confirmed that it had suffered a data breach. Initially only a few details were released – all that was shared was that fraudulent charges were found on credit and debit cards of customers of Neiman Marcus. It did not reveal what types of data were stolen or how many customers were affected. A few weeks later, it was revealed that the data breach was much worse than originally thought. Neiman Marcus has since announced that cyber criminals had hacked into their system and had been operating within it for several months. Over 1.1 million credit and debit cards were affected.

Read more


Hack in the online dating world: millions of passwords and email addresses exposed

Hack in the online dating worldA spate of recent hacks has exposed millions of passwords and email addresses. One organisation has even gone so far as to tell its members that at some point their cyber defences will be breached. The hacks also expose some serious passwords blunders and reveal that many people still don’t understand the need for strong passwords.

 

 

Read more


Google News: Your face can become the next Google ad

Google News: Your face can become the next Google adRecently, Google updated their Terms of Service. The update included permission for Google to use your reviews, name and photo for advertising purposes. Of course this update has now been set as a default setting within everyone’s account. Every time you recommend or comment on an item or service, Google is now permitted to share that reaction, and they’re referring to it as a “Shared Endorsement”.

 

 

Read more


FBI and NSA team up to fight deep web child exploitation

FBI and NSA team up to fight deep web child exploitationAs important as it is, the announcement that Google and Microsoft are trying to stop searches for child pornography overshadows a perhaps more important endeavour in which UK and US law enforcement are going to go hunting on the deep web for predators. This is a welcome move and one that emphasises the need for Facebook protection for children.

 

 

Read more


The cybercriminals Pot of Gold- your Personal Information is just 2 clicks away

Personal informationThisis the Internet era, no doubt about it: general public meets infinite variety of information via countless virtual channels. World Wide Web pages, e-mail, online shopping, and virtual chat rooms bring Internet users together (and help set them apart) in technology-mediated interactions and communication.

 

Read more


“Sensitive information”- How much personal information we share freely?

Personal information sharingThe concept of ‘sensitive information’ has a lot of different definitions, most of them being parts of the laws and regulations of different countries. To sum these definitions up, information is considered to be sensitive if the loss of its confidentiality or availability has severely undesirable effects on organizations or individuals.

 

Read more