12 月 2 日、多くの Twitter ユーザーが騙されて、@VerifiedReport または @MagicReports という名前の偽の Twitter アカウントをフォローしてしまうという事例がありました。どちらも、ユーザーと報道機関やジャーナリストとの間で Twitter 社が行っている実験の一部であると称し、多数の Twitter ユーザーをフォローしながら次のようにツイートしています。「This is a Twitter experiment. We are changing the way users interact with journalists and news organizations.(これは Twitter 実験です。ユーザーとジャーナリストや報道機関との対話方法を変えようと試みています。)」
Yesterday, a number of Twitter users were duped into following fake Twitter accounts known as @VerifiedReport and @MagicReports. Both accounts claimed to be part of a Twitter experiment between users, news organizations, and journalists, and foll…
The Foundation arm of AVAST Software announced today that it will make a donation of 500,000 CZK (approximately $25,000) to support relief and recovery efforts in the Philippines following Typhoon Haiyan. “The greatest needs are for water, food and hygiene kits, and this will be coordinated through our main partner, People in Need, the biggest humanitarian […]
Back in the good ol’ days of Halloween, you only had to worry about your house getting egged or your big brother stealing the good candy. Halloween tricks have moved online, and along with any significant event or holiday, this spooky celebration marks an increase in malware. Cyber ghouls pull out their bag of tricks […]
If your son or daughter is headed off to college this month, don’t shrink back on your commitment to family safety online. Being a college freshman at 17 or 18 doesn’t mean their wisdom download is at 100% complete (far from it). The words “privacy” and “dorm” don’t often show up in same sentence but Read more…
We teach them how to drive, how to cook, and how to find their way through tough situations. But parents today have added another task to their “essential parenting” list they must impart and that is: good tech habits. The role of technology in families is only growing. Tech has become a rather hefty line Read more…
The short answer is yes! You should be concerned. And even if you’re not concerned for yourself, with the Internet all of us are interconnected so cybercrime does not just affect one person or one group, but all of us. Imagine your body being targeted by 100 million viruses. That is exactly what cybercriminals are Read more…
How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox Yes, if […]
How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox Yes, if […]
Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or Read more…