Cybersecurity

You are here

Error message

  • Deprecated function: Creation of dynamic property MemCacheDrupal::$bin is deprecated in MemCacheDrupal->__construct() (line 30 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$wildcard_flushes is deprecated in MemCacheDrupal->reloadVariables() (line 637 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$invalidate is deprecated in MemCacheDrupal->reloadVariables() (line 638 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_lifetime is deprecated in MemCacheDrupal->reloadVariables() (line 639 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_flush is deprecated in MemCacheDrupal->reloadVariables() (line 640 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_content_flush is deprecated in MemCacheDrupal->reloadVariables() (line 641 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$cache_temporary_flush is deprecated in MemCacheDrupal->reloadVariables() (line 642 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).
  • Deprecated function: Creation of dynamic property MemCacheDrupal::$flushed is deprecated in MemCacheDrupal->reloadVariables() (line 643 of /var/www/html/docroot/sites/all/modules/contrib/memcache/memcache.inc).

The Sequel to “Predator the Thief” Gets Unwelcome Update

Malware known as “Predator the Thief”, which is capable of stealing usernames and passwords, has received updates that could make attacks more effective. The malware has added phishing documents, such as fake invoices from companies you may do business with (while a previous campaign used a fake court summons as a lure), to attract victims and has become better able to avoid detection and analysis. Remember to never open an attachment in an email or text unless you know who it is from and what it might be about.

Should Schools Use Facial Recognition Technology?

The use of facial recognition technology continues to grow in K-12 schools despite research suggesting the software may be inaccurate as much as 35% of the time when scanning female faces with darker skin. School leaders say the technology improves security by alerting officials to potential threats more quickly, but these findings raise definite concerns about inequality and social stigmatization.

Watch Out For “Juice Jacking”

Travelers who need to charge their smartphones while on the go might want to avoid public USB charging stations, due to the security risk known as "juice jacking." California law enforcement is warning that USB charging outlets in airports and coffee shops could be loaded with malware. The malware could lock your smartphone or forward personal information such as passwords to hackers.

Fake Microsoft Update email Contains Ransomware

PC users who are updating to the Windows 10 operating system are being warned about fake update emails coming from an address that looks like it is Microsoft. The emails have an attachment that contains ransomware and will encrypt the user's files or lock up a computer, demanding $500 in bitcoin to unlock data. "Windows users should understand that Microsoft will never send patches via email, but rather use their internal update utility embedded in every current Windows operating system," writes Karl Sigler, threat intelligence manager at Trustwave SpiderLabs.

IBM Recruiting for “New Collar” Jobs

A critical skills gap in the tech industry has prompted IBM to develop digital badge portfolios, add apprenticeship programs and strengthen partnerships with community colleges to fill "new-collar" jobs in cloud computing, cybersecurity and other areas where college degrees aren't required. In an interview for Inside Higher Ed, Kelli Jordan, director of IBM career and skills, says it's important that tech companies focus on hiring people with valuable skills, not just people with college degrees.

Quick List of Digital Resources for Bullying Prevention and Cybersecurity

Looking for parent, teacher or school resources on bullying prevention and cybersecurity? Take a look at this list from Tech & Learning online. The resources includes links on how to obtain posters, tip sheets and brochures about bullying for your school, information on Cyber Security Careers, and even a short guide to cryptology that helps students understand the importance of a strong password.

Do You Know How to Spot a Teenage Cyber-Hacker?

A recent study led by Thomas Holt, cybercrime expert at Michigan State University, looks at teen cybercriminals and has found that low self-control is a key predictive factor in whether teens engage in cybercrimes such as hacking. Holt says that many stereotypes of hackers may not be accurate when it comes to teens committing cybercrimes. Holt also says that there's "value in teaching kids that cybercrime will get you in trouble and here's what you can do to protect yourself."

Experts who study the future of work and technology trends expect that teenage cyber hacking could become a problem in the future. Research suggests that there will be a growing need for more "juvenile crime rehabilitation counselors," who can help student cyber-hackers to put their tech talent to more productive use in the not-too-distant future.

School Records Tempt Hackers

Education Dive reports that school records are some of the most sought after data files on the black market. Each school record fetches $250 to $300, making schools, especially small ones with few cybersecurity resources, tempting targets for hackers. In the past three years, schools have been hit more than 500 times by cyber thieves.

Facebook Offers a Wealth of Information to Identity Thieves

Identity theft has exploded in part because of how people use social media, says Frank Abagnale, a former con artist who later became a security consultant and now works with the FBI. "When we interview people who commit these crimes and ask them what's the No. 1 source they go to when they steal someone's identity, they say their Facebook page," he said. One tip of advice he mentions is that you should avoid posting demographic information such as birthplace and birthdate on any social media profile.

Bots Causing Havoc on Social Media

Automated bots are taking over social media, says Arkose Labs, adding that more than half the logins and a quarter of new social media account applications are fraudulent. These fake accounts have implications for those fighting against cyberbullying and misinformation. The company reviewed 1.2 billion third-quarter transactions across platforms, including gaming and e-commerce, and determined that about 75% of fraud on social media was committed by bots.

Pages