Each week we scour the web to discover the latest developments, news and tips that will help you keep your technology (and your business) safe and secure.
Here are the most interesting articles we’ve found this week that could be helpful to you:
Stay safe with our Facebook cheat sheet
Everybody uses Facebook. But not everybody uses it securely. Here are some good tips on keeping your Facebook time as safe as possible.
Studies have shown that although 92% of internet users worry about their online privacy, only 29% have taken steps to change their privacy settings to ensure greater protection on social networking sites.
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks
Phishing attacks are one of the biggest threat on the internet. It’s a scam anyone can fall for. Here are some of the most cunning, most dangerous and most creative phishing attacks out there.
These days, the social engineer’s favorite tool isn’t the smile; it’s the humble phishing message.
It’s a very adaptable piece of kit. It can deliver any manner of malicious payloads, as attachments, embedded objects, or links. It can be customized to lure in any kind of game — from John Q. Public to John Q. White House Ambassador. It can be used as part of attacks to steal data, steal money, or steal secrets.
Samsung warns customers not to discuss personal information in front of smart TVs
Just when you thought you were safe, you find out that your TV might be spying on you! If you have a “smart TV” – definitely read this.
Samsung has confirmed that its “smart TV” sets are listening to customers’ every word, and the company is warning customers not to speak about personal information while near the TV sets.
CTO Perspectives: Why do Security Professionals need Threat Intelligence
As eliminating threats becomes more and more difficult, it becomes more and more important to realize the danger you might be in in your technology environment.
Many factors influence relevancy. Is the threat source known? Is the target known? Are the protocols or behaviors being used by the threat in use in your environment? Does the threat discriminate or does it apply techniques that can broadly apply to many different environments?
Skimmers Hijack ATM Network Cables
A scary new technique to hide ATM skimmers. To stay safe make sure you ALWAYS use a first party ATM.
“These devices are plugged into the ATM network cables and intercept customer card data. Additional devices are attached to the ATM to capture the PIN,” NCR warned. “A keyboard overlay was used to attack an NCR ATM, a concealed camera was used on the Diebold ATM. PIN data is then likely transmitted wirelessly to the skimming device.”