Friday, July 3

Games

Top 3 Socially Accepted Addictions and Their Dangers
Addiction, Children Teens, Drugs Alcohol, Free, Games, Parents Family, Rehab, Reviews, Tools Apps Software, Treatment

Top 3 Socially Accepted Addictions and Their Dangers

There’s a joke about parenthood that goes something like this: “The most expensive part about having a child is all the wine you have to drink.”At the heart of that quip is the idea that parenting is quite a challenge, and that’s enough to get a chuckle out of most people. But the other implication is that drinking wine to combat stress is perfectly normal.As anyone who has struggled with addiction — or watched a loved one do so — knows, equating wine with happiness is a slippery slope. One minute you’re enjoying wine with your friends on a special night out, and the next thing you know, you’re struggling to get through the day without downing an entire bottle.Is this normal? All the jokes and memes floating around the Internet these days, not to mention all the references on TV shows and ...
25 in 25 Volunteer Spotlight – Shelly Parr
Addiction, Drugs Alcohol, Free, Games, How-to Tips, Rehab, Tools Apps Software, Treatment

25 in 25 Volunteer Spotlight – Shelly Parr

To find an avenue for overcoming alcohol misuse, Shelly Parr recalls she “Googled ‘nonreligious alcohol help’ and SMART was the first thing that popped up — thank goodness.”  That was more than six years ago. Since then, Shelly has embraced the power of choice afforded her by SMART Recovery. “I got my old life back and a whole lot of new life,” she enthuses.  For Shelly, who has hosted up to four SMART meetings a week, the social aspect of the program remains significant. “I knew that first holiday season was going to be rough. I connected with Tom Horvath, and even though I wasn’t in one of his sober houses, he invited me to their holiday events to help me stay sober,” she says.  “I thought we needed to do something like this with SMART, so that New Year’s Day I organized a hike. There ...
Turn on MFA Before Crooks Do It For You
Addiction, Breach Hack, Children Teens, Cyber Security, Free, Games, Malware Ransomware, Privacy Data Protection, Safety Security, Tools Apps Software

Turn on MFA Before Crooks Do It For You

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here’s the story of one such incident. As a career chief privacy officer for different organizations, Dennis Dayman has tried to instill in his twin boys the importance of securing their online identities against account takeovers. Both are avid gamers on Microsoft’s Xbox platform, and for years their father managed their accounts via his own Microsoft ac...
COVID-19: Latest Security News & Commentary
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, Guide, How-to Tips, Identity Theft, Malware Ransomware, Parents Family, Phsihing Spam, Privacy Data Protection, Resources, Safety Security, Scams Fraud, Senior Aging, Social Media, Tools Apps Software, Virus

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. ') } else document.write('') Image Source: CDC Newsroom Image library 07/01/2020Another COVID-19 Side Effect: Rising Nation-State Cyber ActivityWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. 06/30/2020COVID-19 Puts ICS Security Initiatives 'On Pause'Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk. CISA Issues Advisory on Home RoutersThe increase in work-from-home employees raises the importance of home router security. Profile of the Po...
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, How-to Tips, Malware Ransomware, Parents Family, Phsihing Spam, Safety Security, Senior Aging, Social Media, Virus

Lessons from COVID-19 Cyberattacks: Where Do We Go Next?

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.Cyber actors have shown us during the pandemic that they will let no opportunity go by without trying to take advantage. We've seen them prey upon the fear and concern around COVID-19 with phishing attacks, and capitalize on security weaknesses as organizations switched to remote work scenarios. And it's had a significant impact on security professionals' roles — a recent survey from (ISC)² found that 81% of respondents said their job function had changed during the pandemic. The upside of this is that there are lessons to learn from the types of attacks and attempts that have occurred that will help prepare organizations for the future. Capitalizing on PanicThe easiest, fastest way to exp...
iOS 14 flags TikTok, 53 other apps spying on iPhone clipboards
Addiction, Children Teens, Cyber Security, Free, Games, Parents Family, Privacy Data Protection, Safety Security, Senior Aging, Sex Porn, Social Media, Tools Apps Software

iOS 14 flags TikTok, 53 other apps spying on iPhone clipboards

In March, researchers Talal Haj Bakry and Tommy Mysk revealed that Android and iOS apps – including the mind-bogglingly popular, China-owned, video-sharing/often in privacy hot water TikTok – could silently, automatically read anything you copy into your mobile device’s clipboard. Sexy selfies? Passwords copied from your password manager? Bank account information? Bitcoin addresses? Yes, yes, scary yes, yes. Anything you’ve copied recently, they’ll paste it into themselves. Such data is typically used for advertising and tracking purposes. The covert content copying is possible not only for a device’s local data, but also on nearby devices, as long as the devices share the same Apple ID and are within about 10 feet of each other. That’s enabled by Apple’s universal clipboard: a cl...
Microsoft issues critical fixes for booby-trapped images – update now!
Addiction, Cyber Security, Free, Games, Malware Ransomware, Safety Security, Tools Apps Software

Microsoft issues critical fixes for booby-trapped images – update now!

Microsoft has just released emergency patches for two critical security holes in the Windows Codecs Library. We all know what Windows means. But what is a Codecs Library, and why are bugs in it such as a big deal that they need to be updated without waiting for the next Patch Tuesday to come round? Well, codec is short for encoder-decoder, and it’s the jargon term for the sort of software that takes data of some sort – notably the raw data that represents the pixels in a video or the sound in an audio file – and reworks it so it can be sent and received easily. The co- part of a codec takes something like a raw image, consisting of rows and rows of colour pixels, and wraps it up in a format such as JPG or PNG so it can saved into a file for downloading or streaming. The -dec part doe...
Smashing Security podcast #183: MAMILs, gameshows, and a surprise from eBay
Addiction, Cyber Security, Free, Games, Privacy Data Protection, Safety Security, Virus

Smashing Security podcast #183: MAMILs, gameshows, and a surprise from eBay

Industry veterans, chatting about computer security and online privacy. A TV gameshow with cash prizes if you’re obeying Coronavirus lockdown rules, ex-Ebay staff charged in crazy cyberstalking case, and when the wrong cyclist was accused by the internet bearing pitchforks.All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. Hosts:Graham Cluley – @gcluleyCarole Theriault – @caroletheriaultGuest:Maria Varmazis – @mvarmazisShow notes:Sponsor: LastPassLastPass Enterprise makes password security effortless for your organization.LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure ...
New ThiefQuest ransomware discovered targeting macOS users
Addiction, Cyber Security, Free, Games, Malware Ransomware, Safety Security, Tools Apps Software

New ThiefQuest ransomware discovered targeting macOS users

Security researchers have discovered this week a new ransomware strain targeting macOS users.Named OSX.ThiefQuest (or EvilQuest), this ransomware is different from previous macOS ransomware threats because besides encrypting the victim's files, ThiefQuest also installs a keylogger, a reverse shell, and steals cryptocurrency wallet-related files from infected hosts."Armed with these capabilities, the attacker can main full control over an infected host," said Patrick Wardle, Principal Security Researcher at Jamf. This means that even if victims paid, the attacker would still have access to their computer and continue to steal files and keyboard strokes.Wardle is currently one of the...