I honestly do not know where to begin with this week’s episode of Mr. Robot, I am still in a bit of shock! Elliot only carried out one hack, but many other things unraveled, leaving with me with so many questions.
Tag Archives: featured1
How to protect your children from cyber-bullying
As a new school year begins, many schools sadly will be setting out to tackle one of the most serious problems now spreading across classrooms: cyber-bullying. While new technologies have opened a whole new world of possibilities for children and adults alike, they have also opened the door to a new type of bullying, where bullies use phones and computers to send photos and threats to their victims.
Recent studies show that in fact, most bullying is now perpetrated online – according to Professor Jose Antonio Casa of the University of Cordoba, eight out of ten cases of school bullying are committed in this way. As such it is natural for parents to want to ensure that their children don’t suffer from this scourge, and fortunately, there are ways to fight back.
Firstly, there are some obvious key steps. Understanding what constitutes cyber-bullying by attending talks provided by schools is an initial step that parents can take in order to identify the threat and fight back.
It is also important to keep an eye out for possible changes in behavior that could indicate that something is amiss and of course, to let your children know that you are there to give them the support they need, especially if something happens to them.
In addition to these first steps (and others such as getting to know the language that young people use today), there are also technological solutions to help combat cyber-bullying.
Use Parental Control tools
In general, it is practically essential to use parental control tools to protect your children. The reason is to be aware of what kids are writing on the devices they use and to monitor their activity on computers, tablets and smartphones. Whilst you can achieve this by literally looking over their shoulder, it is far easier to take a technological approach.
Panda Protection Service includes a range of tools to protect kids from cyber-bullying as well as the other threats they face on the Internet. In addition to blocking inappropriate content, the service lets users ensure that photos and other files remain private. Moreover, it doesn’t just monitor Web browsers on numerous devices (computers, tablets, smartphones…), it can also control the apps downloaded onto all mobile devices.
The post How to protect your children from cyber-bullying appeared first on Panda Security Mediacenter.
Post-vacation Security Tips for your Business
Except for the few of us who choose to visit faraway places at other times of the year, for the majority of us, our vacation time is coming to end. Whether we are refreshed or nostalgic for our summertime getaway, let’s make sure to take into account our IT security while we get back on track.
Memory, Oh Memory
Recent research has proven that the last weeks of summer are an especially sensitive time of the year for some vacation side effects. Many of us are so relaxed we can’t even remember our passwords!
In that case, it’s easy to restore passwords, but we also have to be very careful while doing so. 77% of people who forget their passwords deliberately choose easier ones to replace their former passwords. Of course they do this to avoid another memory lapse, but they must also remember that this makes their password much less effective and lowers their security—in addition to the IT security at their workplace.
Check Out Your Well-Traveled Devices
When a laptop or mobile device leaves their usual space, they can be exposed to a higher number of threats because cybercriminals can connect to these devices (with or without your knowledge) while you’re accessing Wi-Fi networks at hotels, cafeterias and other public spots.
If you have been careful while using these access points it doesn’t mean something will happen. However, during the times of BYOD (Bring Your Own Device), all you have to do is review the devices that access the company network (laptops, mobile phones, tablets etc.) at the end of the summer. We hope you don’t have an unpleasant surprise waiting for you.
Recycling and Good Practices
The best time to revise routines or implement better practices is right after vacation time. This is also an ideal time to conduct an employee training, if your business permits it, in order to update workers on the latest threats. With proper training, your workers will be less likely of biting the “phishing” hook that comes after them.
September Novelties
While the weather is cooling down in the month of September, the technology sector is also getting ready for the hottest presentations of the year. Tech giants like Apple and Google always announce their newest updates and innovations. Companies await security developments regarding the new terminals and operating systems and as soon as the new versions are released, they are reviewed and updated. If your devices are obsolete and no longer support the upgrades, this is a great time to renew them.
Keep these tips in mind without forgetting to take precautions that we must bear in mind throughout the year, as is to have a good cybersecurity solution that allows us to enjoy a safe surfing on our corporate network.
The post Post-vacation Security Tips for your Business appeared first on Panda Security Mediacenter.
What you should know about Windows 10
It is reaching the end of its first year and now companies are asking, is it the right moment to update to Windows 10?Now that it’s becoming somewhat mature, should businesses take the plunge and invest time and money to upgrade their software? The general opinion is that yes, companies should upgrade. After all, it takes far less time and resources to plan the transition than to deal with it after problems emerge due to outdated software.
January 2020 may be far away, but that is when Windows 7 will be discontinued, and businesses need a lot of time—months or even years—to complete this type of transition. There are also some companies that have chosen to continue using Windows 8, an operating system which has brought more sorrow than glory to the corporate sector.
In addition to the added benefits offered in Windows 10, the tech company has also tried to fix the Windows 8 problems and has also introduced new elements that are designed to attract more businesses which is a huge market that Microsoft can’t afford to lose to its competitors: Apple Mac and Google Chromebook.
The main focus for Windows 10 is to reinforce security. Some of the improvements include biometric identification support (Hello), improvements for mobile device management (MDM) and a centralized verification center through Azure Active Directory (this prevents unnecessary password duplication).
Panda Security’s antivirus solutions work perfectly with Windows 10
But perhaps the most talked about and significant aspect for businesses is the new update cycle. With the 10th version of their operating system, Microsoft has gotten rid of something that is typical in other companies: constant updates. Until now, security patches were published once a month (the famous “Patch Tuesday”) and most of the improvements were concentrated in large blocks called “Service packs”.
The wait until 2020 is long and not in-rhythm with the current digital economy, but with this new system, Windows 10 will be able to install updates immediately (as long as the people in charge decide so).
The post What you should know about Windows 10 appeared first on Panda Security Mediacenter.
What are supercomputers? What are they used for?
Supercomputers are also used to perform complex calculations such as climate studies, marine life investigations and advanced manufacturing. The two most powerful supercomputers are in China.
Mr. Robot Review: eps2.7_init_5.fve
Image via: USA Network @whoismrrobot
Twitter frauds: the blue bird with the power to verify your business
What separates Twitter commoners from Twitter royalty? A blue badge indicating who has a special account verified by Twitter. Beware of the cybercriminals who are taking advantage of this.
2012 Dropbox breach strikes again, dumps 68 million passwords online
Dropbox has suffered a password dump of epic proportions. (Image via Graham Cluley)
Dropbox has been going through some rough times as of late. In the past 24 hours, headlines have been popping up left and right about a Dropbox password dump of epic proportions.
You have less than 30 days before Whatsapp shares your information with Facebook
You now have less than 30 days to change your mind if you recently accepted Whatsapp’s new Terms of Service and Privacy Policy.
Privacy Policy update: WhatsApp will share your information with Facebook
This week, every WhatsApp user experienced a pop-up message asking them to agree to the company’s new Terms and Privacy Policy. Those who just simply clicked on the green Agree button probably don’t have much of a clue as to what is going on.