According to a cybersecurity password survey carried out on the United Kingdom millennials by the “Cyber Awareness “government initiative, more than 52% of the millennials are using the same password in accessing the different website and online services. This common behavior exposes most of the millennials to cyber attacks as it makes it easy for hackers to access multiple and critical information from a single password.
One of the critical data is bank account details. This was represented in the survey where 79% of the respondents (a total of 2,261 millennials) admitted to having used simple messaging channels to either send or receive their bank account PIN numbers, driving license information, and even passport data. This critical data has either been sent or received by friends and family members.
The danger is that most individuals forget to delete such information once they have sent or received them. Due to this, access to such emails or accounts could lead to increased cases of identity theft. According to the survey, most millennials often used their email passwords to access other online platforms such as social media accounts, online school accounts, and even online shopping websites.
With the millennials dominating the current web and internet era, the United Kingdom government has taken advantage of the new generation interest by greatly investing in the youth as the future leaders in the field of cybersecurity. The UK government initiated a £20M countrywide program termed “Cyber Discovery”. This program focuses on captivating cyber-security interest and
Facebook used their notification system to trick users into viewing and agreeing to new terms of service. Now that the new GDPR legislation has been passed, Facebook has the headache of gaining consent from its global users to collect and store personal data. The process of enticing users to give this consent is a monumental task. To make sure they are compliant, facebook used tactics that tricked many users into believing they had friend requests and notifications that they did not really have.
The company placed a red dot on the icons warning users they have a new friend request and notification. When the users clicked the icon, they were taken to the terms and conditions consent page. This action made users believe they had to agree to the new terms and condition to be able to view their notifications or accept a new friend request.
Not all users read and understood the policy before taking the easy road and clicking that they agree to the terms, whatever they might be. This consent it a big deal for the global giant. By collecting as much personal information as possible, Facebook is able to sell that information for big bucks to advertisers. The problem with this approach was that there was no way for a user to opt out of consent once it has been granted.
Privacy activist Max Schrems currently has a lawsuit against Facebook for the underhanded way he feels the company forced the users into giving consent. To be compliant with the new laws, the consent must be fair and transparent. Facebook users have 2 options, agree or delete the account. Although there is a real need for Facebook to comply by gaining the consent of the users, misleading and confusing tricks should never be valid a solution.
As if it’s not enough that we have to monitor our privacy and security settings on our computers, mobile devices and even our infant monitors, we now have been given a warning from the FBI that our routers are on the list of items that have been hacked in recent months.
This Business Insider report of the FBI warning details the warning from the FBI, which states that anyone using a router should immediately reboot their routers. Apparently a Russian malware called VPNFilter is able to install secretly on internet routers and thereafter collect data from users. The FBI believes that 500,000 routers, almost all from the Ukraine, have been compromised.
The FBI states that rebooting the routers will cause the malware to be temporarily blocked and will help in possibly identifying devices that are infected with the malware. According to the FBI, you should also disable the remote-management settings, update your password and install any updates for the router.
Also on the Business Insider story is a walkthrough of how to implement these steps. First, type in the router’s IP address into the address bar of the router. You can find the IP address either in the router’s manual or by searching online. Enter your username and password when prompted (if you never set it up, most defaults are admin/password). If this doesn’t work, search for your router’s default login online.
To change your login credentials, go to the advanced settings and administration pages and reset the password. To disable the remote-management settings, go to the advanced settings and find the remote management setting and turn it off. While at the advanced settings, find the firmware update setting and follow the instructions.
If there are no firmware updates, then reboot the router. Following these steps will successfully disable any malware that may be infecting your router.
A computer virus led to the shutdown of the computer network in Lauderdale County. The good news is that no one’s personal information was compromised. According to Chris Tafferty, the system has been down since May 22, but they plan to have it up and running in a few days.
Chris stated that the virus caused a temporary loss of information, but most of it has been restored. He is not sure about what caused the virus to affect the network. However, he believes that Facebook or YouTube may have caused the virus.
Chris stated that the virus is just a risk that comes along with doing business in the 21st century. Brandon Sesser works at East Mississippi Community College. He stated that it is common to see those types of infections.
Brandon has simple tips for preventing an infection. He recommends that people keep their network updated. He also stated that you will need to disable tracking cookies.
Furthermore, Brandon recommends that you be careful about the type of links that you click on. If you get an email with an attachment, then you will need to make sure that you know where it comes from. An email may look like it came from a trusted source, but that does not mean that you should open it.
The worse type of attachment for you to open is an executable file. Many people get viruses on their computer by opening an attachment from a source that is not verified or trusted.
Netgear’s Arlo home security cameras have experienced service disruptions over the past several days according to users and tech writers. The Verge reports that the cameras’ app controls experience errors ranging from “incorrect password” to “internal error” to “internet connectivity issues.” The errors impair users’ abilities to fully access their home security settings though workarounds exist. One option is for users to access the app via a public DNS server or take the app offline.
These workaround options are less than ideal. Fortunately, Netgear reports that the issues affect only “some customers” and those few are only connected to “certain service providers.” The problem is likely caused by DNS issues.
The most newsworthy DNS issues are those related to DNS hacking. DNS hacks are caused when multiple queries hit a DNS server at one time. The queries overload the server rendering it vulnerable. Hackers exploit this vulnerability to redirect the infected sites’ traffic. These types of hacks are often responsible for data breaches and have been used in combination with other hacking techniques to illegally acquire cryptocurrencies.
Netgear has not detailed the DNS problems, nor is it evident if the problem stems from Netgear or if it stems from ISP providers. There is no evidence of hacking confirmed at this time.
In March, Arlo security cam users had difficulties logging in to their accounts. Though The Verge describes Arlo cameras as full of useful features, the article’s author notes that service disruptions are a drawback when it comes to home security.
Technology has now made it possible for computers to not only detect cancer in a patient’s body but to pinpoint where it is located. This information is achieved from a blood sample taken from the patient. Genome Biology published the research on this program in their journal.
The DNA from cancer cells ends up in the bloodstream during its earliest stages. The program looks for specific molecular patterns in the blood sample to see if cancer DNA exists. The program compares the patterns located in the sample against tumor epigenetics from other cancer types collected to determine if the sample contains cancer cells. This technology is allowing for a unique chance of early detection for quicker and possibly more successful treatment.
Professor Jasmine Zhou is the co-lead in this research. She is with the University of California at Los Angeles where she has helped in the creation of this non-invasive method of detecting cancer in patients. The computer-driven program has been designed to detect cancer as well as identify the form of cancer present. This technology is still being advanced and will need further validation, but is promising to be one of the most significant benefits to people with cancer.
Testing of this program consisted using the new technology against two other methods. There were twenty-nine blood samples taken from liver cancer patients. Also taken were twelve samples from patients with lung cancer and five samples from breast cancer patients. Each test was conducted ten times to ensure results were accurate. The error rates on the two optional methods were much higher than the error rate with the new computer program designed by Professor Zhou and her team.
Professor Zhou states the results of the test were evaluated on only those three types of cancer. These types of cancer were chosen for the test to show how the program will work against varying forms of cancer. If the kind of cancer a patient is developing has a tumor in a well-circulated organ such as the liver or lungs; then the easier it will be for the program to pick up the DNA from the blood sample. Organs such as the breasts are not as well circulated and make detection more difficult as the DNA is not flowing as freely in the bloodstream.
The FBI has recently warned Americans that the same hackers behind the DNC 2016 hacks of the Presidential election are now going after home and commercial wifi routers. The law enforcement agency warned everyone to turn off their router and turn it back on. This is said to clear the cache of the router which prevents the hack from being successful.
This simple fix, unfortunately, is only technical. The US DOJ has identified the culprits of the hacks as the Sofacy Group, also known as APT 28 and Fancy Bear. These hackers are directly employed or at least affiliated with the Russian national security services. In this particular hack, the Kremlin-affiliated groups have infected millions of home and business routers across the globe.
The FBI and other US intelligence agencies have proof that the malware from these state-sponsored hackers threatens the people of the United States in a number of ways. The name of the current malady is “VPN Filter“. The malware shuts down the router that it infects and also collects any information sent between that router, connected devices, and the internet.
This means that any website logins, passwords, confidential numbers, etc. could be stolen using this malware. With the tools available to the vast majority of consumers cannot detect this virus. However, when you reset your router that ends up deleting part of the program that causes the problem. The issue is that this solution does not permanently delete the file- it essentially treats the symptom and not the cause.
The ongoing cyber crisis between the United States and Russia is shaping up to be another front in the Cold War 2.0. This hack is designed to scrape as much personal information about users in the United States as possible. This is to steal financial information like bank accounts, credit card numbers etc. They also look to find compromising material in order to gain leverage during negotiations.
The FBI recommends that if you believe you are infected with this malware that you wipe and reinstall the OS of both your internet connected devices and router. This is the only current solution known that will completely remove the program. You can also reset your router for a short-term solution but this will not permanently remove the malware.
You have probably heard of VPN because most people use it to increase their safety while browsing the internet. Generally, there is a clear understanding that a VPN, also known as a Virtual Private Network, encrypts your data by protecting it from the government, hackers and online advertisers seeking to penetrate your browser and inseminate information. However, on the contrary, a recent news article highlighted that there are companies out to destroy web users who utilize a VPN by stealing their private data and selling it to different companies that may find the information somewhat useful. Despite their claims of protecting users from different online attackers, the VPN owners have confidently reflected that they have no good intentions when handling user’s privacies. This is true when it comes to free VPN machines.
Moreover, there is by no means, a strict protocol for VPN network. Therefore, having a trademark sign of VPN is preferably not a definite assurance of the machine’s viability to protect its users. Simply put, this means that a particular VPN could be running while your internet traffic is routed to a different server. However, it does not undoubtedly assure you that you are covered from intruders. Moreover, if you have a free VPN, you should be worried about the risks involved in it because your passwords are probably being scanned. That is not all as there is more to be stolen including sensitive information. Without a doubt, this goes to show that with a free VPN, your data will always be stolen by hackers.
In a technology news report this week, an advocacy group tasked the FTC to conduct investigations on a hotspot shield titled free VPN. This research aimed to establish the causative agent of sharing sensitive information through VPN’s alongside leaking confidential information through different channels irrespective of them promising to protect their users from such risks.
For those who are using any form of VPN service, as long as it is free, know that you are not protected. Moreover, there is a high possibility that these companies are harvesting your data thereby selling it to some of the highest bidders. With that said, it is important for you to consider purchasing your VPN, as far as safety is the major objective.
At the U. C. Berkeley campus, Kiwi robots are a common sight hurrying to deliver food to the hungry students. The robots are below knee-high and are similar in looks to a wheel box, only much more high-tech. The Kiwi robots leave from the headquarters of their creators which is a stone-throw away from the campus grounds.
The business has already fulfilled over 10,000 orders. Something that differentiates this company from other delivery bots businesses is that the testing phase was done on campus grounds instead of on a sidewalk in a busy area. San Francisco even had to ban such testing on sidewalks and streets because it was getting a bit too crowded. The Kiwi delivery bots are also a lot more compact than its competitors and so they take up a lot less space.
On the U. C. Berkley campus, there is an endless supply of testing opportunities for the Kiwi bots as hungry students abound at all times. The testing of the robots has been going well for the company, and the students of the university as well as teachers seem to quite like the small robots wheeling down corridors to deliver a much-needed snack. Most students describe the robots as cute.
The company’s robots come in several different sizes to fit a broader scope of delivery needs. The approach of the company is modular, and so varied sizes are used for various tasks. The Kiwi robots are designed for the last 300 meters of the delivery. Until then, the small four-wheeled bot takes a ride in another robot that does the heavy lifting.
The multi-modal system was developed after using a single size robot to go from the restaurant to the client’s doorstep. The company noticed that doing things that way was inefficient and so they developed two more types of robots. One is inside the restaurant, the other is a semi-autonomous tricycle going on the streets, and then there are the small robots delivering the meal to the client.
As of yet, Kiwi is only a startup. The robots are not mass produced for international sale, not even nationwide sale. The company has a lot to do before they reach that level. Fortunately, the plucky startup has a plentiful of ideas to go around and work on for the near future.
The better the web browser, the better experience that you will have cruising round the Internet. A crappy browser will set you up for all kinds of problems. Most people start out with the browser that is packaged with the program on their computer. The majority of computer users continue on happily with the browser, even if it is not the best. Sooner or later, the computer user is going to start looking for a new browser. Often, they are confused about the browsers and don’t realize that today’s online world is filled with browsers that are absolutely amazing. For example, Firefox and a few other browsers were upgraded and are top quality browsers.
Firefox sadly lagged behind a number of the top browsers. The good news is that the browser is back in charge and in high demand because of the new changes. Sources report that the once very popular browser has gone through a number of important changes that will make you want to upgrade your current version of the browser or simply download the new version to your computer. Here is something worth noting. This is the first complete update to the browser in about 13 years. Now, the new version of the browser is faster, does not hog your system, and is equipped with new privacy tools.
More users than ever are downloading Google Chrome, because of the recent changes. The new browser is very efficient and take up minimal screen space. Users often complain about browsers that take up the entire screen. This simple improvement will help drive the browser up in popularity. They’ve added a wide variety of extensions and the ability to customize the browser to your own liking.
Opera has a very minimal part of the browser market. However, it is a very fast loading and efficient browser. Opera also is equipped with a turbo feature that speeds up browsing. Included are other great features like a battery saving mode for mobile users, along with an ad blocker.