Friday, July 3

Virus

Developing Patience: A Critical Skill for Addiction Recovery
Addiction, Drugs Alcohol, Free, Tools Apps Software, Virus

Developing Patience: A Critical Skill for Addiction Recovery

Provided by SMART Family & Friends Facilitator, Kathy Lang Surely one of the lessons of the past few months in dealing with COVID-19 has been the value of developing patience.  In our Family & Friends meetings here at SMART, we often stress the importance of patience.  Why?  It’s because we recognize that it takes time for change to happen.   Change is a Seesaw Research shows us that the stages of change are not linear.  We make change in a seesaw manner.  Any kind of change is hard.  We think about it, change our mind, wrestle with ambivalence.  Even after the commitment is firm, we most often act in a seesaw fashion as well.  One day we’re successful and then we falter.  We eat that hot fudge sundae after an entire week of strict dieting.  Old habits die hard. It requires patien...
Persistence Pays Off
Addiction, Cyber Security, Drugs Alcohol, Free, Privacy Data Protection, Resources, Tools Apps Software, Virus

Persistence Pays Off

Provided by SMART Family & Friends Facilitator, Kerry Hammell In the fall of 2018, I started the SMART Recovery Family & Friends meeting in Campbell River on Vancouver Island, B.C., Canada.  It quickly developed a regular following of 10-15 participants that often reported that the meetings were providing each of them with tremendous support and encouragement. Then came COVID-19 in March 2020.    Now, I am the first to admit to my almost total incompetence with technology.  So, getting on board with the suggested ZOOM meetings shook me to my core. However, every week I read out the opening meeting remarks referencing “Practice, Patience & Persistence,” and being a firm believer in ‘practice what you preach’, I knew I had to give it a go!  I had collected everyone’s contact in...
COVID-19 ‘Breach Bubble’ Waiting to Pop?
Breach Hack, Cyber Crime, Cyber Security, Free, How-to Tips, Malware Ransomware, Safety Security, Scams Fraud, Tools Apps Software, Virus

COVID-19 ‘Breach Bubble’ Waiting to Pop?

The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest both trends are about to change — and likely for the worse. The economic laws of supply and demand hold just as true in the business world as they do in the cybercrime space. Global lockdowns from COVID-19 have resulted in far fewer fraudsters willing or able to visit retail stores to use their counterfeit cards, and the decreased demand has severely depressed prices in the underground for purloined card data. An ad for a site sell...
Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
Breach Hack, Cyber Crime, Cyber Security, Free, How-to Tips, Malware Ransomware, Safety Security, Scams Fraud, Tools Apps Software, Virus

Another COVID-19 Side Effect: Rising Nation-State Cyber Activity

While financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. Months into the COVID-19 pandemic,countless large and small businesses across the globe are operating in survival mode, focused on pushing through the storm. While companies concentrate on getting through each day and week, one at a time, we would be careless not to encourage them to scrutinize the potential bad actors — specifically, nation-states — that are looking to capitalize on the weaknesses created or exposed by the pandemic. According to a security vendor Radware, by the end of 2019, over a quarter of companies had experienced a foreign government/nation-state attack. In 2018, 19% of organizations believed they were attacked by a nation-state. That f...
4 Steps to a More Mature Identity Program
Cyber Security, Free, How-to Tips, Identity Theft, Resources, Safety Security, Virus

4 Steps to a More Mature Identity Program

Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.Certain junctures in history have created unintended dichotomies: haves and have nots, protected and unprotected. In cybersecurity, COVID-19 has shown us whether an enterprise is well ahead of the digital transformation curve or woefully behind. Those who've transformed have also embraced a security approach that de-emphasizes perimeter defense and instead elevates identity. Many organizations have rushed to provision IT services such as a virtual private network or other access controls to enable a virtual workforce, but identity is much more than merely providing access gateways to resources. Access without oversight merely increases the attack surface for an enterprise. Using...
Chinese Software Company Aisino Uninstalls GoldenSpy Malware
Cyber Security, Free, How-to Tips, Malware Ransomware, Resources, Safety Security, Tools Apps Software, Virus

Chinese Software Company Aisino Uninstalls GoldenSpy Malware

Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it's still unclear whether it was culpable. For those who followed the GoldenSpy story last week from Trustwave, where tax software from China-based Aisino was used as a backdoor to gain access to the networks of foreign firms doing business with a Chinese bank, there's an interesting wrinkle. While doing a routine follow-up investigation in a sandbox after last week's initial disclosure, Trustwave researchers found that after being discovered, Aisino sent software out with one mission in mind: to delete GoldenSpy with an uninstaller and remove any trace it existed. Brian Hussey, Trustwave's vice president of cyber threat detection and response, says this new development was significant because ...
COVID-19: Latest Security News & Commentary
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, Guide, How-to Tips, Identity Theft, Malware Ransomware, Parents Family, Phsihing Spam, Privacy Data Protection, Resources, Safety Security, Scams Fraud, Senior Aging, Social Media, Tools Apps Software, Virus

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic. ') } else document.write('') Image Source: CDC Newsroom Image library 07/01/2020Another COVID-19 Side Effect: Rising Nation-State Cyber ActivityWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs. 06/30/2020COVID-19 Puts ICS Security Initiatives 'On Pause'Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk. CISA Issues Advisory on Home RoutersThe increase in work-from-home employees raises the importance of home router security. Profile of the Po...
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Addiction, Breach Hack, Children Teens, Cyber Crime, Cyber Security, Free, Games, How-to Tips, Malware Ransomware, Parents Family, Phsihing Spam, Safety Security, Senior Aging, Social Media, Virus

Lessons from COVID-19 Cyberattacks: Where Do We Go Next?

We need to learn from the attacks and attempts that have occurred in order to prepare for the future.Cyber actors have shown us during the pandemic that they will let no opportunity go by without trying to take advantage. We've seen them prey upon the fear and concern around COVID-19 with phishing attacks, and capitalize on security weaknesses as organizations switched to remote work scenarios. And it's had a significant impact on security professionals' roles — a recent survey from (ISC)² found that 81% of respondents said their job function had changed during the pandemic. The upside of this is that there are lessons to learn from the types of attacks and attempts that have occurred that will help prepare organizations for the future. Capitalizing on PanicThe easiest, fastest way to exp...
Beware “secure DNS” scam targeting website owners and bloggers
Breach Hack, Cyber Security, Free, How-to Tips, Malware Ransomware, Phsihing Spam, Privacy Data Protection, Safety Security, Scams Fraud, Virus

Beware “secure DNS” scam targeting website owners and bloggers

If you run a website or a blog, you probably use a cloud provider or a dedicated hosting company to manage your server and deliver the content to your readers, viewers and listeners. We certainly do – both Naked Security and our sister site Sophos News are hosted by WordPress VIP. That’s not a secret (nor is it meant to be), not least because most providers identify themselves in the HTTP headers they send back in their web replies, if only as a matter of courtesy: $ getheaders https://news.sophos.com Connecting... OK. TLS handshake... OK. ---headers--- server: nginx date: Mon, 29 Jun 2020 10:21:21 GMT content-type: text/html; charset=UTF-8 content-length: 0 x-hacker: If you're reading this, you should visit wpvip.com/careers and apply to join the fun, mention this header...
Firefox 78 is out – with a mysteriously empty list of security fixes
Addiction, Breach Hack, Children Teens, Cyber Security, Free, How-to Tips, Parents Family, Safety Security, Senior Aging, Social Media, Virus

Firefox 78 is out – with a mysteriously empty list of security fixes

Yesterday was both a Tuesday and four weeks since the last major Firefox update, making it the official release date for the latest version. There are now three mainstream flavours of Firefox to choose from: 68.10ESR, 78.0ESR and 78.0. ESR is short for Extended Support Release, often preferred by IT departments because it gets security fixes at the same rate as the regular version, but only takes on new features in a staggered fashion – in other words, users of the ESR versions are shielded from sudden switches in appearance, user interface and workflow. This time you can choose from 68.10ESR (the numbers to the left and right of the dot add up to the current major version number, in this case 78), which is Firefox with the look-and-feel of about a year ago plus 10 updates’ worth of ...