Information

Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone

For many, proactively monitoring ESG risks is not only the right thing to do – it’s the right business strategy. More than ever investors, consumers and partners are using ESG factors to determine who they do business with.  In this session, Mastercard’s Johan Gerber, EVP, Cyber and Security Products, discusses: ● New industry findings on how organizations are navigating this new landscape ● The strategies and tools needed to mitigate ESG risk on a business’s supply chain and…

Read More

A step‑by‑step guide to enjoying LinkedIn safely

LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a step-by-step guide on how to enjoy LinkedIn safely. Managing our privacy settings is overwhelming. There’s a lot of menus, a lot buttons to enable, select, accept or reject – it certainly gives a sense of…

Read More

Google and Apple release patches for zero‑day flaws – Week in security with Tony Anscombe

Both tech giants rush to release fixes for security vulnerabilities that were being exploited in-the-wild Google and Apple are both release patches for zero-day vulnerabilities that have already been exploited in the wild. ESET cybersecurity expert Tony Anscombe explains what those vulnerabilities are in simpler words, and reiterate the importance of keeping all your apps and devices up-to-date to stay cybersafe. Watch the video to learn more.

Read More

The future starts now: 10 major challenges facing cybersecurity

To mark Antimalware Day, we’ve rounded up some of the most pressing issues for cybersecurity now and in the future Organizations large and small have never been more at risk from cyberattacks, to the point that the litany of evolving and escalating cyberthreats have made cybersecurity a key boardroom-level agenda item. As security is the backbone of a successful digital transformation, getting a grip on it becomes vital. The need to stay ahead of the…

Read More

S3 Ep107: Eight months to kick out the crooks and you think that’s GOOD? [Audio + Text]

by Paul Ducklin WE DON’T KNOW HOW BAD WE WERE, BUT PERHAPS THE CROOKS WEREN’T ANY GOOD? Click-and-drag on the soundwaves below to skip to any point. You can also listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. You can listen to us on Soundcloud, Apple Podcasts, Google Podcasts, Spotify, Stitcher and anywhere that good podcasts are found. Or just drop the URL of our RSS…

Read More

Red Cross Seeks ‘Digital Emblem’ to Protect Against Hacking

The International Committee of the Red Cross said Thursday it is seeking support to create a “digital red cross/red crescent emblem” that would make clear to military and other hackers that they have entered the computer systems of medical facilities or Red Cross offices. The Geneva-based humanitarian organization said it was calling on governments, Red Cross and Red Crescent societies, and IT experts to join forces in developing “concrete ways to protect medical and humanitarian…

Read More

Hacker Charged With Extorting Online Psychotherapy Service

A 25-year-old Finnish man has been charged with extorting a once popular and now-bankrupt online psychotherapy company and its patients. Finnish authorities rarely name suspects in an investigation, but they were willing to make an exception for Julius “Zeekill” Kivimaki, a notorious hacker who — at the tender age of 17 — had been convicted of more than 50,000 cybercrimes, including data breaches, payment fraud, operating botnets, and calling in bomb threats. In late October…

Read More

Is your personal data all over the internet? 7 steps to cleaning up your online presence

You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps Have you ever searched for yourself on Google? It may sound odd, but it is actually a great way to discover a tiny part of what the web knows about us. And, most importantly, it is the only way we have to know if we need to ask Google to remove relevant…

Read More

What is doxing and how to protect yourself

Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you How harmful can it be to have your social media accounts set to public? Or to tag the restaurant where you’re having that delicious meal? Almost everyone does it! Let’s turn the questions around: Do you remember ever searching for someone you just met on social media to find out as much as…

Read More

French hospital crippled by cyberattack – Week in security with Tony Anscombe

As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts A major hospital near Paris has been hit by a ransomware attack that crippled its computer and medical systems and forced it to send patients to other healthcare facilities. The criminals demand $10 million from the hospital for restoring access to its systems, which the facility refused to pay. In this week’s video, Tony wonders if the…

Read More