How do I secure my social media profile?

Credit to Author: William Tsing| Date: Thu, 23 Feb 2017 14:00:07 +0000

Quitting social media entirely can be unrealistic, or at least seriously unfun. So it’s important to take a moment to check out account settings before you start, to make absolutely sure you’re okay with the service’s default settings.

Categories:

Tags:

(Read more…)

Read more

Staying safe online on Valentine’s Day

Credit to Author: Christopher Boyd| Date: Tue, 14 Feb 2017 10:00:48 +0000

We give some advice on how to steer clear of scams and other bad things on Valentine’s Day. Everything from social engineering and bots to revenge porn and money mules are covered.

Categories:

Tags:

(Read more…)

Read more

Threat Actors will come up with new Targeted Attack Tactics that Circumvent Current Anti-evasion Solutions

In the Trend Micro 2017 Security Predictions report, we cover many of the threats that organizations will have to deal with this year and none could be more challenging that a targeted attack. We recently saw a report from the Identity Theft Resource Center which said 2016 had the most data breaches in US history. Within…

Read more

Avoid these “Free Minecraft / Garry’s Mod” adverts

If you see ads claiming to offer up free games like Garry’s Mod or Minecraft, you may wish to think twice – you’ll definitely get an extension, you may receive an executable, but free Minecraft? Keep searching, intrepid gamer…

Categories:

Tags:

(Read more…)

Read more

Mobile Menace Monday: AndroRAT Evolved

An increasing amount of mobile malware known as Android/Trojan.AndroRAT has been seen in the wild lately.  AndroRAT is a contraction of Android and RAT (Remote Access Tool).  This piece of malware is far from new, but has gradually become more evolved over the years. AndroRAT History As the story goes (according to its GitHub page),…

Categories:

Tags:

(Read more…)

Read more

Verified Twitter accounts compromised, get busy spamming

Verified Twitter accounts tend to be a little more secure than those belonging to non-verified users due to the amount of extra hoop jumping required to get one of those ticks in the first place. A number of security requirements, including providing a phone number and setting up 2FA, are all things a would-be verified Twitter user needs to do. Unfortunately, things can still go wrong…

Categories:

Tags:

(Read more…)

Read more