Cyberbullying: if you have a tween or teen and haven’t workshopped this with your kids then you need to put a time in the diary now. Cyberbullying is one of the biggest challenges our children’s generation will face and unfortunately, it isn’t going away. The recent tragic suicide of 14 year old Aussie girl Amy […]
The post Cyberbullying – How Parents Can Minimize Impact On Kids appeared first on McAfee Blogs.
You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.
Everyone’s favorite social media site is currently the subject of hot debate, and we’re here to keep you grounded amidst the madness. First, let’s talk about what happened. Back in 2014, a quiz made the rounds on Facebook. 270,000 users took the quiz, which harvested data not just about them, but also their friends. As a result, the quiz aggregated the private info of 50 million Facebook users. All that data was then allegedly sold to the Trump presidential campaign.
The example on everyone’s minds is, of course, Russian interference in the 2016 presidential election, now further confirmed by special counsel Robert Mueller’s investigation. The Kremlin’s use of social media to stoke existing partisan tensions in the U.S., achieved through a sophisticated multi-million-dollar operation, resulted in the indictment in February of thirteen Russian nationals and three companies.
Unfortunately, Macs might be the sports cars of the IT business, but just like any car, they need proper maintenance to keep running. In this guide we’ll walk you through the essentials — and even some great secrets — to clean up invisible clutter and tune up your MacBook, iMac, or Mac Pro beyond its limits.
Weekly security roundup week of March 12th
Samba admins urged to patch
An important vulnerability that came to light this past week is one in the venerable Samba open-source networking stack – and if you’re a Samba admin, you need to update now.
Endpoints are an easy target for hackers, so it’s essential that small businesses protect themselves. Connected employees, vulnerable software and weak antivirus all contribute to this being a favorite target of hackers. And, as the list below details, there are many types of cyberattacks that target endpoints, from phishing to malvertising.
Our new Avast Business endpoint security products are once again in the spotlight, highlighted in CRN’s 2018 Security 100 list of the 20 Coolest Endpoint Security Vendors.
In November 2017, we detected a strain of malware known as JSMiner in Google Play. The Monero cryptomining capabilities were discovered inside the gaming application Cooee. At the time of discovery, we forecasted a rise in mobile mining malware as atta…
“Alexa, please let any would-be robbers know that I’m currently out of town and my house is sitting empty.”