Digital Defense

2,595 Flips | 1 Magazine | 9 Likes | 30 Following | 131 Followers | @JonDCampbell | Keep up with Digital Defense on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Digital Defense”

Endpoint breach prevention by reducing attack surfaces

In this podcast recorded at Black Hat USA 2018, Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys, talks about endpoint breach …

Information Security

Here's the Latest Way "Hackers" Are Trying to Trick You Into Giving Them Money

A stranger was had blown the doors off my digital privacy, and was holding my relationships and reputation as ransom... or so he wanted me to …

Black Mirror

What are phishing kits? Web components of phishing attacks explained

Phishing is a social attack, directly related to social engineering. Commonly centered around email, criminals use phishing to obtain access or …

Cybersecurity

12 Tips for Staying Safe and Secure on Twitter

Twitter is great for interacting with niche audiences and specific fandoms, but it's also full of abuse and harassment. Here's how to protect …

Social Media

How to Improve Your Cyber-Security

Written by Anna Kucirkova Online life is the latest fad, the biggest trend. In this technologically-driven world, we work, shop, play and live …

Cybersecurity

VPN vs DNS and Proxy Servers – Which is Best | Tech.Co

A VPN, Smart DNS and Proxy Server can each provide you with added layers of security to protect your privacy online, or help you to access services …

Information Systems

Google’s latest Chromebook ad highlights the worst of Windows and MacOS

• Google has released a new Chromebook ad that throws shade at Windows and macOS.<br>• The ad compares Chrome OS to its rivals by showing an increasing number of issues that occur on the other systems.<br>• The ad also demonstrates that Chrome OS is much more than just a web browser inside a computer.<p>For many …

Google

Why your mobile device could be the biggest risk to your money

This article is reprinted by permission from NerdWallet.<p>This year marks a decade since the global financial crisis. Although the biggest financial …

Identity Theft

Your cell phone number is more important and less secure than your Twitter password

It's shockingly easy for hackers to hijack your digital life using phone numbers. The public should press Congress and carriers to improve security.<p>On July Fourth, hackers accessed computers at the social media aggregator Timehop. They stole 21 million user records. Timehop executives quickly …

Identity Theft

LifeLock ID theft protection leak could have aided identity thieves

LifeLock's identity theft protection service suffered from a security flaw that put users' identities in jeopardy. The event forced its parent company, Symantec, to pull part of its website* down to fix the issue after it was notified by <i>KrebsOnSecurity</i>. According to Krebs, Atlanta-based security …

Identity Theft

Google now has its own hardware security keys

Yesterday, Google revealed that it completely cut phishing attacks against more than 85,000 employees by making them use hardware security keys. They're small USB drive-sized devices that handle online logins, and they're proven to be even more secure than other two-factor authentication methods. …

Mobile Devices

Common Cybersecurity Threats and How to Protect Yourself | Investopedia

As technology changes and hackers quickly adapt, many people are finding cybercrime and the steps to keeping their online information secure too …

Personal Information

New Free Chrome Plugin Blocks Cryptojacking Browser Attacks

Qualys also plans Firefox, Safari, IE versions.

Chrome Web Store

Update Your iPhones And Androids Now If You Don't Want Your Bluetooth Hacked

There’s a potentially serious vulnerability affecting Bluetooth that could lead to leaks of private data from Apple, Google and Intel-based smartphones and PCs. Patches are being made available, so concerned users should update where they can. Millions, if not hundreds of millions or billions, of …

Information Security

None of Google's 85,000 employees have had their work accounts taken over in a year — and it's because of a simple $20 product anyone can use

One of the most common ways that people get hacked is called phishing or spearphishing.<p>Basically, attackers craft an email that looks just like something you'd normally click on, like a bill or an email telling you to change your password. Unsuspecting people click on the link in the phishing …

Employment

How to Change Your iPhone Passcode (to Something Secure)

Still using a four-digit passcode? You can now beef up your iPhone and iPad security by setting up a six-digit passcode and even alphanumeric …

Touch ID

Russian operatives blasted 18,000 tweets ahead of a huge news day during the 2016 presidential campaign. Did they know what was coming?

By Craig Timberg<p>, Reporter<p>Shane Harris<p>, Reporter<p>On the eve of one of the newsiest days of the 2016 presidential election season, a group of Russian operatives fired off tweets at a furious pace, about a dozen each minute. By the time they finished, more than 18,000 had been sent through cyberspace …

Government

Social Security Issues Warning About Scams Similar To Those IRS Phone Scams

It may be summer, but the bad guys aren’t taking a vacation. The Acting Inspector General of Social Security, Gale Stallworth Stone, has issued a warning about an ongoing phone scam from thieves pretending to be from the Social Security Administration (SSA).<p>[id=14]<p>As part of the con, scammers try …

Identity Theft

Pay-n-pray cybersecurity isn’t working. What if we just paid when it works?

<i>(in)Secure</i> <i>is a weekly column that dives into the rapidly escalating topic of cybersecurity.</i><p>Like home security, people would often rather not think …

Cybersecurity

How to protect yourself from 'spear phishing' hacking technique

In typical phishing scams, cybercriminals send blanket emails to a large swath of users, hoping someone will take the bait and download an infected …

Spearphishing

The Trickster Hackers - Backdoor Obfuscation and Evasion Techniques

• share<p>A backdoor is a method for bypassing the normal authentication or encryption of a system. Sometimes developers construct backdoors to their own …

Cybersecurity

How to Make Your Wifi Router as Secure as Possible

Though more router manufacturers are making routers easier to set up and configure—even via handy little apps instead of annoying web-based …

Wi-Fi

Hackers account for 90% of login attempts at online retailers

Selling stolen personal data is a big business for hackers: Somewhere on the dark web, your e-mail address and a few passwords are probably for sale (hopefully, old ones). Cyber criminals buy troves of this information to try to login to websites where they can grab something valuable like cash, …

Online Life

5 easy ways to protect yourself from hackers

In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting hacked might seem inevitable. But according to former NSA hacker David Kennedy, there are steps you can take to prevent it from happening to you. Kennedy shares his five must-do tips for protecting …

Personal Information

How location data is used to manipulate airfare and car rental prices

Credit: coffeebeanworks / Pixabay<p>While the EU recently passed the GDPR into law to give users control of how their data is collected and used, the battle is unfortunately only half won.<p>According to a new (and shocking!) study by TheBestVPN, you could end up paying almost double (or more) the actual …

Flying

How's Spear Phishing Different From Plain Old Phishing?

As U.S. political theater continues to play out on a global stage, the phrase "spear phishing" has popped up several times. A 2016 joint report from …

Instagram is building non-SMS 2-factor auth to thwart SIM hackers

Hackers can steal your phone number by reassigning it to a different SIM card, use it to reset your passwords, steal your Instagram and other accounts and sell them for bitcoin. As detailed in a harrowing Motherboard article today, Instagram accounts are especially vulnerable because the app only …

Social Media

How to check the security of your Google Chrome extensions

The other day, a friend called me and said that his Google Chrome browser is acting weirdly and may need reinstalling. According to him, every time he searched for something on Google some unknown website appeared with suspicious results. I asked him to remove every Chrome extension and only add …

Google

The 111 Million Record Pemiblanc Credential Stuffing List

One of the most alarming trends I've seen in the world of data breaches since starting Have I Been Pwned (HIBP) back in 2013 is the rapid rise of …

Identity Theft

Hackers use macro-based attack to deploy malware, hijack desktop shortcuts and inject backdoor

Security researchers have discovered a new malware strain, which they suspect is still under development, leveraging malicious macros to deliver a …