FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WIRED

Elon Musk’s DOGE Is Being Sued Under the Privacy Act: What to Know

By: Eric Geller — February 18th 2025 at 21:50
At least eight ongoing lawsuits related to the so-called Department of Government Efficiency’s alleged access to sensitive data hinge on the Watergate-inspired Privacy Act of 1974. But it’s not airtight.
☐ ☆ ✇ WIRED

Top US Election Security Watchdog Forced to Stop Election Security Work

By: Eric Geller — February 15th 2025 at 03:07
The US Cybersecurity and Infrastructure Security Agency has frozen efforts to aid states in securing elections, according to an internal memo viewed by WIRED.
☐ ☆ ✇ WIRED

US Funding Cuts Are Helping Criminals Get Away With Child Abuse and Human Trafficking

By: Matt Burgess — February 10th 2025 at 17:47
Services supporting victims of online child exploitation and trafficking around the world have faced USAID and State Department cuts—and children are suffering as a result, sources tell WIRED.
☐ ☆ ✇ WIRED

ACLU Warns DOGE’s ‘Unchecked’ Access Could Violate Federal Law

By: Dell Cameron — February 7th 2025 at 21:43
The ACLU says it stands ready to sue for access to government records that detail DOGE’s access to sensitive personnel data.
☐ ☆ ✇ WIRED

DOGE Teen Owns ‘Tesla.Sexy LLC’ and Worked at Startup That Has Hired Convicted Hackers

By: Andy Greenberg, David Gilbert, Lily Hay Newman — February 6th 2025 at 07:30
Experts question whether Edward Coristine, a DOGE staffer who has gone by “Big Balls” online, would pass the background check typically required for access to sensitive US government systems.
☐ ☆ ✇ WIRED

The Collapse of USAID Is Already Fueling Human Trafficking and Slavery at Scammer Compounds

By: Matt Burgess, Lily Hay Newman — February 5th 2025 at 17:33
The dismantling of USAID by Elon Musk's DOGE and a State Department funding freeze have severely disrupted efforts to help people escape forced labor camps run by criminal scammers.
☐ ☆ ✇ WIRED

The Trial at the Tip of the Terrorgram Iceberg

By: Ali Winston — January 29th 2025 at 12:00
Atomwaffen Division cofounder and alleged Terrorgram Collective member Brandon Russell is facing a potential 20-year sentence for an alleged plot on a Baltimore electrical station. His case is only the beginning.
☐ ☆ ✇ WIRED

Trump Frees Silk Road Creator Ross Ulbricht After 11 Years in Prison

By: Andy Greenberg — January 22nd 2025 at 00:49
Donald Trump pardoned the creator of the world’s first dark-web drug market, who is now a libertarian cause célèbre in some parts of the crypto community.
☐ ☆ ✇ WIRED

Biden's Cyber Ambassador Urges Trump Not to Cede Ground to Russia and China in Global Tech Fight

By: Eric Geller — January 16th 2025 at 11:30
Nathaniel Fick, the ambassador for cyberspace and digital policy, has led US tech diplomacy amid a rising tide of pressure from authoritarian regimes. Will the Trump administration undo that work?
☐ ☆ ✇ WIRED

A New Jam-Packed Biden Executive Order Tackles Cybersecurity, AI, and More

By: Eric Geller — January 16th 2025 at 10:30
US president Joe Biden just issued a 40-page executive order that aims to bolster federal cybersecurity protections, directs government use of AI—and takes a swipe at Microsoft’s dominance.
☐ ☆ ✇ WIRED

Secret Phone Surveillance Tech Was Likely Deployed at 2024 DNC

By: Dhruv Mehrotra — January 10th 2025 at 15:21
Data WIRED collected during the 2024 Democratic National Convention strongly suggests the use of a cell-site simulator, a controversial spy device that intercepts sensitive data from every phone in its range.
☐ ☆ ✇ WIRED

Rumble Among 15 Targets of Texas Attorney General’s Child Privacy Probe

By: Paresh Dave — January 9th 2025 at 21:02
Texas has become a leading enforcer of internet rules. Its latest probe includes some platforms that privacy experts describe as unusual suspects.
☐ ☆ ✇ WIRED

How the US TikTok Ban Would Actually Work

By: Matt Burgess — January 9th 2025 at 19:46
The fate of TikTok now rests in the hands of the US Supreme Court. If a law banning the social video app this month is upheld, it won’t disappear from your phone—but it will get messy fast.
☐ ☆ ✇ WIRED

Californians Say X Blocked Them From Viewing Amber Alert About Missing 14-Year-Old

By: Kate Knibbs — January 3rd 2025 at 15:36
Many people reported they hit a screen preventing them from seeing the alert unless they signed in.
☐ ☆ ✇ WIRED

Congress Again Fails to Limit Scope of Spy Powers in New Defense Bill

By: Dell Cameron — December 18th 2024 at 20:31
The National Defense Authorization Act passed today, but lawmakers stripped language that would keep the Trump administration from wielding unprecedented authority to surveil Americans.
☐ ☆ ✇ WIRED

The Top Cybersecurity Agency in the US Is Bracing for Donald Trump

By: Eric Geller — December 16th 2024 at 11:30
Staffers at the Cybersecurity and Infrastructure Security Agency tell WIRED they fear the new administration will cut programs that keep the US safe—and “persecution.”
☐ ☆ ✇ WIRED

The Simple Math Behind Public Key Cryptography

By: John Pavlus — December 15th 2024 at 12:00
The security system that underlies the internet makes use of a curious fact: You can broadcast part of your encryption to make your information much more secure.
☐ ☆ ✇ WIRED

As the Mastermind of Far-Right ‘Active Clubs’ Goes to Prison, His Violent Movement Goes Global

By: Ali Winston — December 13th 2024 at 10:00
The white supremacist Robert Rundo faces years in prison. But the “Active Club” network he helped create has proliferated in countries around the world, from Eastern Europe to South America.
☐ ☆ ✇ WIRED

FTC Says Data Brokers Unlawfully Tracked Protesters and US Military Personnel

By: Dell Cameron, Dhruv Mehrotra — December 3rd 2024 at 19:18
The FTC is targeting data brokers that monitored people’s movements during protests and around US military installations. But signs suggest the Trump administration will be far more lenient.
☐ ☆ ✇ WIRED

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

By: Dell Cameron, Andrew Couts — December 3rd 2024 at 13:00
A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.
☐ ☆ ✇ WIRED

Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany

By: Dhruv Mehrotra, Dell Cameron — November 20th 2024 at 04:00
More than 3 billion phone coordinates collected by a US data broker expose the detailed movements of US military and intelligence workers in Germany—and the Pentagon is powerless to stop it.
☐ ☆ ✇ WIRED

Immigration Police Can Already Sidestep US Sanctuary City Laws Using Data-Sharing Fusion Centers

By: Lily Hay Newman — November 19th 2024 at 10:00
Built to combat terrorism, fusion centers give US Immigration and Customs Enforcement a way to gain access to data that’s meant to be protected under city laws limiting local police cooperation with ICE.
☐ ☆ ✇ WIRED

More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity

By: Eric Geller — November 14th 2024 at 10:30
Experts expect Donald Trump’s next administration to relax cybersecurity rules on businesses, abandon concerns around human rights, and take an aggressive stance against the cyber armies of US adversaries.
☐ ☆ ✇ Security – Cisco Blog

Leveraging Threat Intelligence in Cisco Secure Network Analytics, Part 2

By: Robert Harris — November 8th 2024 at 13:00
You can use public Cisco Talos blogs and third-party threat intelligence data with Cisco Secure Network Analytics to build custom security events.
☐ ☆ ✇ WIRED

Russia Is Going All Out on Election Day Interference

By: Lily Hay Newman, Tess Owen — November 5th 2024 at 21:04
Along with other foreign influence operations—including from Iran—Kremlin-backed campaigns to stoke division and fear have gone into overdrive.
☐ ☆ ✇ WIRED

Flaw in Right-Wing ‘Election Integrity’ App Exposes Voter-Suppression Plan and User Data

By: Dhruv Mehrotra — November 5th 2024 at 16:56
A bug that WIRED discovered in True the Vote’s VoteAlert app revealed user information—and an election worker who wrote about carrying out an illegal voter-suppression scheme.
☐ ☆ ✇ WIRED

The Untold Story of Trump's Failed Attempt to Overthrow Venezuela's President

By: Zach Dorfman — October 31st 2024 at 09:30
A successful CIA hack of Venezuela's military payroll system, insider fights for spy agency resources, and messy opposition politics: A WIRED investigation reveals a secret Trump-era attempt to oust autocratic ruler Nicolás Maduro.
☐ ☆ ✇ WIRED

‘We’re a Fortress Now’: The Militarization of US Elections Is Here

By: David Gilbert — October 30th 2024 at 15:31
From bulletproof glass, drones, and snipers to boulders blocking election offices, the US democratic system is bracing for violent attacks in 2024.
☐ ☆ ✇ WIRED

Cybercriminals Pose a Greater Threat of Disruptive US Election Hacks Than Russia or China

By: Lily Hay Newman, Dell Cameron — October 28th 2024 at 13:00
A report distributed by the US Department of Homeland Security warned that financially motivated cybercriminals are more likely to attack US election infrastructure than state-backed hackers.
☐ ☆ ✇ WIRED

Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions

By: Lily Hay Newman — October 23rd 2024 at 16:00
Russia, Iran, and China are targeting the US election with an evolving array of influence operations in the last days of campaign season.
☐ ☆ ✇ WIRED

A Trump Win Could Unleash Dangerous AI

By: Eric Geller — October 21st 2024 at 10:30
Donald Trump's opposition to “woke” safety standards for artificial intelligence would likely mean the dismantling of regulations that protect Americans from misinformation, discrimination, and worse.
☐ ☆ ✇ WIRED

The Disinformation Warning Coming From the Edge of Europe

By: Morgan Meaker — October 19th 2024 at 06:00
Moldova is facing a tide of disinformation unprecedented in complexity and aggression, the head of a new center meant to combat it tells WIRED. And platforms like Facebook, TikTok, Telegram and YouTube could do more.
☐ ☆ ✇ WIRED

License Plate Readers Are Creating a US-Wide Database of More Than Just Cars

By: Matt Burgess, Dhruv Mehrotra — October 3rd 2024 at 10:30
From Trump campaign signs to Planned Parenthood bumper stickers, license plate readers around the US are creating searchable databases that reveal Americans’ political leanings and more.
☐ ☆ ✇ WIRED

Elon Musk Is a National Security Risk

By: Andrew Couts — September 16th 2024 at 20:55
Musk’s now-deleted post questioning why no one has attempted to assassinate Joe Biden and Kamala Harris renews concerns over his work for the US government—and potential to inspire extremist violence.
☐ ☆ ✇ Security – Cisco Blog

Secure Network Analytics 7.5.1 Launch

By: Rob Ayoub — September 10th 2024 at 12:00
Secure Network Analytics 7.5.1 is now available. This release provides features including expanded firewall log ingestion, custom dashboards, better ISE integration, and much more.
☐ ☆ ✇ Security – Cisco Blog

Leveraging Threat Intelligence in Cisco Secure Network Analytics

By: Robert Harris — September 4th 2024 at 12:00
Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud. The purpose of this blog is to review two methods of using threat intelligence in Secure Network Analytics. First, we will cover the threat intelligence feed, and then we will look at using your own […]
☐ ☆ ✇ McAfee Blogs

Internet Safety Begins with All of Us

By: Jasdev Dhaliwal — August 28th 2024 at 12:16

A safer internet isn’t a nice thing to have. It’s a necessity because we rely on it so heavily. And there’s plenty we can do to make it happen. 

A safer internet might seem like it’s a bit out of our hands as individuals. The truth is that each of us plays a major role in making it so. As members, contributors, and participants who hop on the internet daily, our actions can make the internet a safer place. 

So, specifically, what can we do? Take a few moments to ponder the questions that follow. Using them can help frame your thinking about internet safety and how you can make yourself, and others, safer. 

  1. How am I keeping my devices safe? 
  2. How am I keeping myself and my family safe? 
  3. How am I treating other people online? 

How am I keeping my devices safe? 

Device safety is relatively straightforward provided you take the steps to ensure it. You can protect your things with comprehensive online protection like our McAfee+ plans, you can update your devices and apps, and you can use strong, unique passwords with the help of a password manager. 

Put another way, internet safety is another way to keep your house in shape. Just as you mow your lawn, swap out the batteries in your smoke alarm, or change the filters in your heating system, much goes the same for the way you should look after computers, tablets, phones, and connected devices in your home. They need your regular care and maintenance as well. Again, good security software can handle so much of this automatically or with relatively easy effort on your part. 

If you’re wondering where to start with looking after the security of your devices, check out our article on how to become an IT pro in your home. It makes the process easy by breaking down the basics into steps that build your confidence along the way. 

How am I keeping myself and my family safe? 

This includes all kinds of topics. The range covers identity theft, protecting your personal info, privacy, cyberbullying, screen time, when to get a smartphone for your child, and learning how to spot scams online. Just to name a few. And if you visit our blogs from time to time, you see that we cover those and other topics in detail. It offers a solid resource any time you have questions. 

Certainly, you have tools that can give you a big hand with those concerns. That includes virtual private networks (VPNs) that encrypt your personal info, built-in browser advisors that help you search and surf safely, plus scam protection that lets you know when sketchy links pop up in emails and messages. 

However, internet safety goes beyond devices. It’s a mindset.  As with driving a car, so much of our online safety relies on our behaviors and good judgment. For example, one piece of research found that ninety-one percent of all cyberattacks start with phishing emails.i  

As Tomas Holt, professor of criminal justice at Michigan State University, states, “An individual’s characteristics are critical in studying how cybercrime perseveres, particularly the person’s impulsiveness and the activities that they engage in while online that have the greatest impact on their risk.”  

Put another way, scammers bank on an itchy clicker-finger — where a quick click opens the door for an attack. Educating your family about the risks out there, such as phishing attacks and sketchy links that crop up in search goes a long way to keep everyone out of trouble. In combination with online protection software like ours covers the rest of the way. 

How am I treating other people online? 

A big part of a safer internet is us. Specifically, how we treat each other — and how we project ourselves to friends, family, and the wider internet. With so much of our communication happening online through the written word or posted pictures, all of it creates a climate around each of us. It can take on an uplifting air or mire you in a cloud of negativity. What’s more, it’s largely out there for all to see. Especially on social media. 

Take time to pause and reflect on your climate. A good place to start is with basic etiquette. Verywell Family put together an article on internet etiquette for kids, yet when you give it a close read, you’ll see that it provides good advice for everyone.ii  

In summary, their advice focuses on five key points: 

  1. Treat others how you want to be treated — this is the “Golden Rule,” which applies online just as it does in every other aspect of our lives. 
  2. Keep messages and posts positive and truthful — steering clear of rudeness, hurtful sarcasm, and rumor-mongering is the way to go here. 
  3. Double-check messages before hitting send — ask yourself if what you’ve written can be misinterpreted, especially when people can’t see your facial expression or hear your tone of voice.
  4. Don’t violate a friend’s confidence — think about that picture or post … will it embarrass someone you know or share something not meant to be shared? 
  5. Avoid digital drama — learn when to respectfully exit a conversation that’s getting mean, rude, or otherwise hurtful. 

Of course, the flip side to all of this is what to do when someone targets you with their bad behavior. Such as when an online troll who hurls hurtful or malicious comments your way. That’s a topic in itself. Check out our article on internet trolls and how to handle them. Once again, the advice there is great for everyone in the family. 

Being safer … take it in steps

We’ve shared quite a bit of info in this article and loaded it up with plenty of helpful links too. Don’t feel like you have to take care of everything in one sitting. See what you have in place and make notes about where you’d like to make improvements. Then, start working down the list. A few minutes each week dedicated to your security can greatly increase your security, safety, and savvy. 

[i] https://www.darkreading.com/endpoint/91–of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704

[ii] https://www.verywellfamily.com/things-to-teach-your-kids-about-digital-etiquette-460548

The post Internet Safety Begins with All of Us appeared first on McAfee Blog.

☐ ☆ ✇ WIRED

A Single Iranian Hacker Group Targeted Both Presidential Campaigns, Google Says

By: Andy Greenberg — August 14th 2024 at 22:27
APT42, which is believed to work for Iran’s Revolutionary Guard Corps, targeted about a dozen people associated with both Trump’s and Biden’s campaigns this spring, according to Google’s Threat Analysis Group.
☐ ☆ ✇ WIRED

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

By: Lily Hay Newman — August 2nd 2024 at 16:34
Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.
☐ ☆ ✇ WIRED

At the Olympics, AI Is Watching You

By: Morgan Meaker — July 25th 2024 at 11:25
A controversial new surveillance system in Paris foreshadows a future where there are too many CCTV cameras for humans to physically watch.
☐ ☆ ✇ WIRED

J.D. Vance Left His Venmo Public. Here’s What It Shows

By: Dhruv Mehrotra, Tim Marchman, Andrew Couts — July 18th 2024 at 17:02
The Republican VP nominee's Venmo network reveals connections ranging from the architects of Project 2025 to enemies of Donald Trump—and the populist's close ties to the very elites he rails against.
☐ ☆ ✇ WIRED

Surprise! The Latest ‘Comprehensive’ US Privacy Bill Is Doomed

By: Dell Cameron — June 27th 2024 at 15:55
Gutted of civil rights protections by Democrats to woo pro-business Republicans, the American Privacy Rights Act was pulled from a key congressional hearing—and appears unlikely to receive a full vote.
☐ ☆ ✇ Security – Cisco Blog

Digital Forensics for Investigating the Metaverse

By: Dr. Giannis Tziakouris — June 26th 2024 at 12:00
Exploring the Metaverse? Discover its hidden cybersecurity risks and stay protected. Dive into the evolving world of virtual reality with us, where we uncover and tackle the security challenges of tomorrow
☐ ☆ ✇ WIRED

Red Tape Is Making Hospital Ransomware Attacks Worse

By: Matt Burgess — June 24th 2024 at 09:00
With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives.
☐ ☆ ✇ Security – Cisco Blog

Operationalizing our custom “SOC in a Box” at the RSA Conference 2024

By: Aditya Sankar — June 13th 2024 at 12:00
Cisco engineers often face the challenge of setting up a Security Operations Center in two days at global events. Aditya Sankar explains the process with our “SOC in a Box” in this blog.
☐ ☆ ✇ WIRED

US Leaders Dodge Questions About Israel’s Influence Campaign

By: Dell Cameron — June 11th 2024 at 16:13
Democratic leader Hakeem Jeffries has joined US intelligence officials in ignoring repeated inquiries about Israel’s “malign” efforts to covertly influence US voters.
☐ ☆ ✇ WIRED

How Donald Trump Could Weaponize US Surveillance in a Second Term

By: Thor Benson — June 3rd 2024 at 10:30
Donald Trump has vowed to go after political enemies, undocumented immigrants, and others if he wins. Experts warn he could easily turn the surveillance state against his targets.
☐ ☆ ✇ WIRED

Secrecy Concerns Mount Over Spy Powers Targeting US Data Centers

By: Dell Cameron — May 14th 2024 at 16:16
A coalition of digital rights groups is demanding the US declassify records that would clarify just how expansive a major surveillance program really is.
☐ ☆ ✇ The Hacker News

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

By: Newsroom — May 9th 2024 at 15:20
Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. "The campaign sent emails with content intended to arouse the recipient's interest and persuade him to click on the link," the computer emergency response team, CERT Polska, said in a Wednesday bulletin. Clicking on the link
☐ ☆ ✇ WIRED

The Next US President Will Have Troubling New Surveillance Powers

By: Dell Cameron — April 22nd 2024 at 16:59
Over the weekend, President Joe Biden signed legislation not only reauthorizing a major FISA spy program but expanding it in ways that could have major implications for privacy rights in the US.
☐ ☆ ✇ WIRED

The Trump Jury Has a Doxing Problem

By: Andrew Couts — April 18th 2024 at 19:25
One juror in former US president Donald Trump’s criminal case in New York has been excused over fears she could be identified. It could get even messier.
☐ ☆ ✇ WIRED

Big Tech Says Spy Bill Turns Its Workers Into Informants

By: Dell Cameron — April 17th 2024 at 18:11
One of Silicon Valley’s most influential lobbying arms joins privacy reformers in a fight against the Biden administration–backed expansion of a major US surveillance program.
☐ ☆ ✇ WIRED

US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’

By: Dell Cameron — April 16th 2024 at 17:02
A controversial bill reauthorizing the Section 702 spy program may force whole new categories of businesses to eavesdrop on the US government’s behalf, including on fellow Americans.
☐ ☆ ✇ Security – Cisco Blog

Cisco Telemetry Broker (CTB) 2.1 Launch

By: Rob Ayoub — April 15th 2024 at 12:00

The ability to generate NetFlow from devices that do not natively produce it along with significant storage efficiency and improved workflows make for a significant update to CTB.

Cisco Telemetry… Read more on Cisco Blogs

☐ ☆ ✇ WIRED

House Votes to Extend—and Expand—a Major US Spy Program

By: Dell Cameron — April 12th 2024 at 19:30
The US House of Representatives voted on Friday to extend the Section 702 spy program. It passed without an amendment that would have required the FBI to obtain a warrant to access Americans’ information.
☐ ☆ ✇ WIRED

Trump Loyalists Kill Vote on US Wiretap Program

By: Dell Cameron — April 10th 2024 at 20:15
An attempt to reauthorize Section 702, the so-called crown jewel of US spy powers, failed for a third time in the House of Representatives after former president Donald Trump criticized the law.
☐ ☆ ✇ WIRED

Section 702: The Future of the Biggest US Spy Program Hangs in the Balance

— April 9th 2024 at 20:21
The US Congress will this week decide the fate of Section 702, a major surveillance program that will soon expire if lawmakers do not act. WIRED is tracking the major developments as they unfold.
☐ ☆ ✇ WIRED

A Breakthrough Online Privacy Proposal Hits Congress

By: Makena Kelly — April 7th 2024 at 21:13
While some states have made data privacy gains, the US has so far been unable to implement protections at a federal level. A new bipartisan proposal called APRA could break the impasse.
☐ ☆ ✇ The Hacker News

Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded 'AcidPour' Malware

By: Newsroom — March 22nd 2024 at 03:06
The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed connections between the malware and AcidRain, tying it to threat activity clusters associated with Russian military intelligence. "AcidPour's expanded capabilities would enable it to better
☐ ☆ ✇ The Hacker News

From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks

By: Newsroom — March 19th 2024 at 13:55
Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware capable of bypassing YARA rules. "Generative AI can be used to evade string-based YARA rules by augmenting the source code of small malware variants, effectively lowering detection rates," Recorded Future said in a new report shared with The Hacker News.
❌