A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US
Craig Peterson - America's Leading Technology News Commentator
Release Date: 02/03/2023
Craig Peterson - America's Leading Technology News Commentator
In today's digital age, our children face unprecedented risks on social media platforms. As parents, it's crucial to understand these threats and take proactive measures to ensure their safety. In a recent article, I delved into this pressing issue, highlighting key points that every parent should keep in mind. Join me as I discuss the alarming ease with which children can be exposed to inappropriate content and dangerous individuals online. We'll talk about vigilance, monitoring, and teaching our kids how to be safe online. Don't miss out on the essential tips and tools I've shared in the...
info_outlineCraig Peterson - America's Leading Technology News Commentator
In this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Do you ever feel like someone is watching you as you browse the internet? With so much personal data at stake, it's no wonder that online privacy has become a hot-button issue. Luckily, there's a new player in town: privacy-focused search engines. These search engines are prioritizing user privacy and security by shaking up the online landscape. No longer will your personal information be sold to the highest bidder or your browsing history used against you. With privacy-focused search engines, you can rest easy knowing that your online activities are shielded from prying eyes. But how do they...
info_outlineCraig Peterson - America's Leading Technology News Commentator
In this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It's essentially a security hole in software that hasn't been patched yet. These vulnerabilities can range from minor to critical, depending on how long the vendor can patch them. These are so dangerous because hackers can take advantage of them before they're patched. They can use these vulnerabilities to infect your computer with malware or ransomware, steal your data, or even take control of your...
info_outlineCraig Peterson - America's Leading Technology News Commentator
In today's fast-paced, technology-driven world, it is crucial for computer users to stay informed about the latest updates and security measures for their systems. For Windows users, automatic updates are a common method of ensuring their devices remain up-to-date and protected against various threats. While these updates are essential for maintaining a secure and smoothly operating system, they can also introduce unexpected problems, such as data loss, system instability, and other unwelcome changes. This podcast aims to shed light on the hidden dangers of automatic Windows updates and...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Which patches are critical? When do they really need to be applied? That’s where our new PatchAware™ features come in. We’re monitoring the thousands of patches that are issued every week, and will tell you which patches are the most critical to install right now. This week’s tip, 9 years after it was discovered, is the “Heartbleed” bug. It is still one of the most significant threats to online security. It gives the bad guys access to sensitive information from affected systems. This article highlights the importance of upgrading software and keeping it up-to-date with...
info_outlineCraig Peterson - America's Leading Technology News Commentator
First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...
info_outlineA Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint
The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers…
Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.
They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions' potential consequences, such as identity theft or data breaches.
Electric Cars…
Security and the Electric Vehicle Charging Infrastructure Failing US
The communications networks that connect chargers with their management system, the personal data that travels across those networks, the charge-point operators collecting payments, and the grid itself are increasingly vulnerable as the EV ecosystem grows and the attack surface expands. The risks include (but are not limited to):
- Disruption of operations for public charger networks, rendering large numbers of chargers unusable and interfering with transportation
- A takeover of charger networks to use the chargers as bots in massive distributed denial-of-service (DDoS) attacks
- Theft of customers’ personal identifiable information (PII), including payment card information
- Fraudulent payments for electricity used in EV charging
- Disruption to the power grid, leading to blackouts and equipment damage
- Damage to the EV charging provider's reputation
Google…
Google Pushes Privacy to the Limit in Updated Terms of Service
https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit
Google has a long history of searching the Play Store, its app repository, for programs that contain malware. Less than a year ago, Google removed multiple apps from the Play Store that had the banking Trojan SharkBot hidden inside.
However, while removing troublesome apps from the Play Store would seem prudent, Google takes this one step further into a legal gray area.
Debbie Reynolds says that Google's ToS is ambiguous because it is unclear precisely what it might block or remove that is "known to be harmful to the device, data or users." The ToS also does not commit Google to tell users when it makes such a deletion.
Ransomware…
Ransomware Profits Decline as Victims Dig In, Refuse to Pay
https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay
In another sign that the tide may finally turn against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers.
"Our findings suggest that a combination of factors and best practices — such as security preparedness, sanctions, more stringent insurance policies, and the continued work of researchers — are effective in curbing payments."
"The businesses that are most inclined not to pay are those that are well prepared for a ransomware attack."
Privacy…
Why your data is more valuable than you may realize
https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think.
Use a GPS map app to find a restaurant that specializes in a particular cuisine, and the search provider can ascertain that you eat out, what day of the week you eat out, possibly how frequently, how far you are prepared to travel, possible food preference, the time of day you eat, etc. In this case, the snippet of data was just the name of the restaurant, yet the resulting information that can be deduced from the action can be significant.
Understanding how data is collected and the conclusions that can be drawn is complicated and likely a topic that is interesting when someone explains it but probably too complex for any actions to avoid collection. I would hazard a guess that even those in the know, so to speak, likely give away more information than they realize.
Dark Web…
Business Insiders Pose a Huge Threat – Hunting Insider Threats on the Dark Web
https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web
According to recent research, malicious employees contribute to 20% of incidents, and the attacks that insiders are involved in are, on average, ten times larger than those conducted by external actors. Further data has shown an increase in insider threat attacks over the past two years, as the risk has been exacerbated by remote working through the pandemic.
To minimize insider threats, all organizations should monitor marketplaces, forums, and social media channels for chatter about their company. This helps them to spot the early warning signs of an imminent attack, such as cybercriminals looking for insider knowledge or disgruntled employees making unsavory comments.