January 2021

Ci sono momenti che ti cambiano, alcuni per il dolore causato mentre altri per la grande gioia.  Questa e’ la mia fortunata storia di un tempo che ha cambiato la mia vita. Durante gli ultimi cinque anni ho avuto la fortuna di creare una organizzazione da zero, di farla nascere, di custodirla, di partecipare ad […]

Read More [ITA] Gratitudine e Cambiamento

New research:

Pile driving occurs during construction of marine platforms, including offshore windfarms, producing intense sounds that can adversely affect marine animals. We quantified how a commercially and economically important squid (Doryteuthis pealeii: Lesueur 1821) responded to pile driving sounds recorded from a windfarm installation within this species’ habitat. Fifteen-minute portions of these sounds were played to 16 individual squid. A subset of animals (n = 11) received a second exposure after a 24-h rest period. Body pattern changes, inking, jetting, and startle responses were observed and nearly all squid exhibited at least one response. These responses occurred primarily during the first 8 impulses and diminished quickly, indicating potential rapid, short-term habituation. Similar response rates were seen 24-h later, suggesting squid re-sensitized to the noise. Increased tolerance of anti-predatory alarm responses may alter squids’ ability to deter and evade predators. Noise exposure may also disrupt normal intraspecific communication and ecologically relevant responses to sound. …

Read More Friday Squid Blogging: Squids Don’t Like Pile-Driving Noises

The unprecedented volume of unemployment insurance fraud witnessed in 2020 hasn’t abated, although news coverage of the issue has largely been pushed off the front pages by other events. But the ID theft problem is coming to the fore once again: Countless Americans will soon be receiving notices from state regulators saying they owe thousands of dollars in taxes on benefits they never received last year.

Read More The Taxman Cometh for ID Theft Victims

Online Wedding

Digital Marriage—Making Sure Your Online Wedding is Safe and Secure Love finds a way. Even in a pandemic.  Across this year and last, a growing number of couples are sticking to their wedding dates as planned, yet with a twist—they’re holding them online. Whether to comply with local guidance, accommodate friends and family who cannot […]

The post Digital Marriage—Making Sure Your Online Wedding is Safe and Secure appeared first on McAfee Blogs.

Read More Digital Marriage—Making Sure Your Online Wedding is Safe and Secure

Well, it kinda feels like we’re back to the new normal that is 2021. I’m home, the kids are back at school and we’re all still getting breached. We’re breached so much that even when we’re not breached but someone says we’re breached, it genuinely looks like we’re breached. Ok,

Read More Weekly Update 228

data breach

ShinyHunters Exposes Over 125 Million Online Credentials   Meet ShinyHunters, a hacker who recently leaked 10 new databases this past month from companies including: • Pixlr.com • Bonobos.com • Wognai.com • Tesspring.com • Tunedglobal.com • Buyucoin.com • Wappalyzer.com • Chqbook.com • Rooter.io • MeetMindful.com But this isn’t the first time they’ve made headlines. It all started […]

The post ShinyHunters Exposes Over 125 Million Online Credentials appeared first on McAfee Blogs.

Read More ShinyHunters Exposes Over 125 Million Online Credentials

The lessons we have learned during the past 12 months have demonstrated that the ability to respond to, and bounce back from adversity in general, can impact the short-and long-term success of any organization. It can even dictate the leaders and laggards in any industry.

The post Why operational resilience will be key in 2021, and how this impacts cybersecurity appeared first on Microsoft Security.

Read More Why operational resilience will be key in 2021, and how this impacts cybersecurity

Digital You

10 Easy Ways to Build Up Your Family’s Online Security The events of 2020 didn’t just set significant lifestyle changes in motion. According to a recent study, it also influenced our mindset about our online security. McAfee’s 2021 Consumer Security Mindset Report highlights our collective shift to a Digital-First mindset and the increased risks that come with […]

The post 10 Easy Ways to Build Up Your Family’s Online Security appeared first on McAfee Blogs.

Read More 10 Easy Ways to Build Up Your Family’s Online Security

A couple of days ago, I have been asked whether, notably thanks to the GDPR[1] and the CCPA[2], we were seeing as professionals, a standardization in negotiations governing privacy terms. Alas, we have possibly never been so much away of such harmonization. 128 out of 194 countries have put in place legislation to secure the […]

The post Schrems II – A few Things to Keep in Mind! appeared first on McAfee Blogs.

Read More Schrems II – A few Things to Keep in Mind!

Data Privacy Day

One of the positive trends that we’ve seen in recent years is governments and users pressuring companies to simplify their privacy policies and security settings. This comes after a slew of concerning incidents, such as widespread data breaches and data sharing by social media companies. The spotlight on these issues is beginning to take effect, […]

The post This Data Privacy Day Own Your Privacy, Even On Social Sites appeared first on McAfee Blogs.

Read More This Data Privacy Day Own Your Privacy, Even On Social Sites

Graham Cluley Security News is sponsored this week by the folks at Orca Security. Thanks to the great team there for their support! You’re probably familiar with the shared responsibility model. The basic idea is that public cloud providers such as Ama…

Read More How do most cloud security breaches happen? Orca’s “State of Public Cloud Security” report reveals all

McAfee’s Advanced Threat Research team just completed its second annual capture the flag (CTF) contest for internal employees. Based on tremendous internal feedback, we’ve decided to open it up to the public, starting with a set of challenges we designed in 2019.   We’ve done our best to minimize guesswork and gimmicks and instead of flashy graphics and games, we’ve distilled the kind of problems […]

The post McAfee ATR Launches Education-Inspired Capture the Flag Contest! appeared first on McAfee Blogs.

Read More McAfee ATR Launches Education-Inspired Capture the Flag Contest!

The global cloud computing market is set to reach $623.3 billion by 2023. The cloud is the ultimate tool in building highly scalable and flexible networks that can be set up in a flash. This offers a great opportunity for businesses looking to avoid high sunk costs in setting up infrastructure or, in phasing out […]

The post Top Benefits of a Cloud Computing Security Solution appeared first on CyberDB.

Read More Top Benefits of a Cloud Computing Security Solution

Deployment architecture in cloud-native applications now consists of loosely coupled components (microservices), with all application services provided through a dedicated infrastructure (service mesh) independent of the application code. Two critical …

Read More Attribute-based Access Control for Microservices-based Applications Using a Service Mesh: Draft SP 800-204B is Available for Comment

Digital You

New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report  2020 was a year unlike any other. We transitioned from the corporate office to the home office, participated in distance learning, and figured out how to communicate with one another from afar. We sought out new forms of entertainment by streaming countless movies and TV […]

The post New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report appeared first on McAfee Blogs.

Read More New Year, New Digital You: Consumer Security Findings from McAfee’s Latest Report

Digital You

New Year, New Digital You: Canadian Survey Findings from McAfee McAfee is headquartered in the U.S. and with our impressive global footprint protecting over 600 million devices protecting users’ connected lives isn’t just a priority for one location, but for the entire world that we serve.  As Site Leader of our Consumer Ontario offices, when […]

The post New Year, New Digital You: Canadian Survey Findings from McAfee appeared first on McAfee Blogs.

Read More New Year, New Digital You: Canadian Survey Findings from McAfee

New and updated supplemental materials for NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, and NIST SP 800-53B, Control Baselines for Information Systems and Organizations, are …

Read More NIST Releases Supplemental Materials for SP 800-53 and SP 800-53B: Control Catalog and Control Baselines in Spreadsheet Format

Organizations frequently share information through various information exchange channels based on mission and business needs. In order to protect the confidentiality, integrity, and availability of exchanged information commensurate with risk, the info…

Read More Managing the Security of Information Exchanges: Draft NIST SP 800-47 Revision 1 Available for Comment

In 2020, we recorded 1,120 breaches and cyber attacks that were reported on in mainstream media, which accounted for 20,120,074,547 leaked records. Compiling this information enables us to see how security incidents occur and the trends to look out for. Did you know, for example, that the number of disclosed incidents shot up in the second half of the year, showing the impact that COVID-19 has had on organisations? Or that there was a 50% increase in breached records compared to 2019? In this blog, we take a closer look at this data. You can also find a summary in

The post 2020 cyber security statistics appeared first on IT Governance UK Blog.

Read More 2020 cyber security statistics

Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit miners had slipped off the radar as Bitcoin’s value plummeted in recent years, but now authors are hoping to profit off the latest price increase. Researchers have identified […]

The post Cyber News Rundown: Cryptomining Malware Resurgent appeared first on Webroot Blog.

Read More Cyber News Rundown: Cryptomining Malware Resurgent

Data Privacy Day

Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […]

The post Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) appeared first on McAfee Blogs.

Read More Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)

Denial-of-service (DoS) attacks are intended to shut down or severely disrupt an organisation’s systems. Unlike most cyber attacks, the goal isn’t to steal sensitive information but to frustrate the victim by knocking their website offline. The criminal hacker therefore doesn’t profit from the attack, but the loss of service can cost the victim up to £35,000. Why would an attacker be interested in doing this? Typically, it’s because they hold a grudge against the target – many DoS attacks are politically motivated – although some attacks are used to distract the victim as the attacker launches a more sophisticated attack

The post What is a DoS (denial-of-service) attack? appeared first on IT Governance UK Blog.

Read More What is a DoS (denial-of-service) attack?

Digital babies

The Connected Lives of Babies: Protecting Their First Footprints in the Digital World A baby can leave their first internet footprints even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. That “Hello, […]

The post The Connected Lives of Babies: Protecting Their First Footprints in the Digital World appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting Their First Footprints in the Digital World

Parler, the beleaguered social network advertised as a “free speech” alternative to Facebook and Twitter, has had a tough month. Apple and Google removed the Parler app from its stores, and Amazon blocked the platform from using its hosting services. Parler has since found a home in DDoS-Guard, a Russian digital infrastructure company. But now it appears DDoS-Guard is about to be relieved of more than two-thirds of the Internet address space the company leases to clients — including the Internet addresses currently occupied by Parler.

Read More DDoS-Guard To Forfeit Internet Space Occupied by Parler

Ransomware Alert

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and students returned to the virtual classroom. But according to the FBI, cyberattacks are likely to disrupt online learning in the new year. As of December 2020, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and […]

The post Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 appeared first on McAfee Blogs.

Read More Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021

Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to market. In this Employee Spotlight, we talk to Account Development Executive, Jordan Gray, who works with C-level executives to integrate threat intelligence solutions within their environments. […]

The post Employee Spotlight: The Human Faces Behind Artificial Intelligence appeared first on Webroot Blog.

Read More Employee Spotlight: The Human Faces Behind Artificial Intelligence

Holiday Video Chat

  The Connected Lives of Babies: Protecting Their First Footprints in the Digital World, Part Two Picture an infant with a credit card. In her name. With a $10,000 limit. Well, it happens. As recent as 2017, it was estimated that more than 1 million children in the U.S. were victims of identity theft. Of […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part Two

Your employees encounter potential cyber security threats on a daily basis. Perhaps there’s a new face in the office that they don’t recognise, or a new password they need to remember, or a database of sensitive information that they need to upload onto the Cloud. In The Psychology of Information Security, Leron Zinatullin explains how employees respond to those challenges and explains why they make the decisions they do. For example, he found that employees usually don’t have a solid understanding of information security or their obligations to protect information. In the rare cases where employees are aware of and follow

The post How your staff make security decisions: The psychology of information security appeared first on IT Governance UK Blog.

Read More How your staff make security decisions: The psychology of information security

Digital from birth

The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their first footprints internet even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. […]

The post The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1 appeared first on McAfee Blogs.

Read More The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1

We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge. But as the saying goes, nothing worth having comes easy, and ISO 27001 is definitely worth having. If you’re just getting started with ISO 27001, we’ve compiled this 9 step implementation checklist to help you along the way. Step 1: Assemble an implementation team Your first task is to appoint a project leader to oversee the implementation of the ISMS. They should have a well-rounded knowledge of information security as well as the authority to lead a team and give orders to

The post ISO 27001 checklist: a step-by-step guide to implementation appeared first on IT Governance UK Blog.

Read More ISO 27001 checklist: a step-by-step guide to implementation

A little bit of a change of pace this week with the video being solely on the events unfolding around removing content, people and even entire platforms from the internet. These are significant events in history, regardless of your political persuasion, and they’re likely to have a very long-lasting impact

Read More Weekly Update 226

Depending on your life experiences, the phrase (or country song by Eric Church) “two pink lines” may bring up a wide range of powerful emotions.    I suspect, like many fathers and expecting fathers, I will never forget the moment I found out my wife was pregnant.  You might recall what you were doing, or where […]

The post Two Pink Lines appeared first on McAfee Blogs.

Read More Two Pink Lines

Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to dismantling systemic racism affecting marginalized groups and leading a peaceful movement to promote equality for all Americans, irrespective of color and creed. He leaves behind a legacy of courage, strength, perseverance, and a life-long dedication […]

The post Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community appeared first on McAfee Blogs.

Read More Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community

CES 2021

Typically, the International Consumer Electronics Show (CES) gives us a sense of where technology is going in the future. However, this year’s show was arguably more about technology catching up with how the COVID-19 pandemic has reshaped our lives. While gathering in person was not an option, we still had the opportunity to witness incredible […]

The post CES 2021: Highlights From the “Cleanest” Show Yet! appeared first on McAfee Blogs.

Read More CES 2021: Highlights From the “Cleanest” Show Yet!