According to the United Nations there are currently over 3 billion Internet users! As we all continue to embrace this sophisticated technology into our daily lives, it is becoming increasingly important for everyone to understand how the web works and for governments, software companies and tech developers to highlight areas of vulnerability for users while offering advice for safeguarding their systems. Possessing a basic understanding of the processes and forms of cybercrime could help prevent online attacks and possibly save you from identity theft, financial losses, stolen documentation or a dead computer.
Source: A Quick Guide to Cyber Security
A recent report by the National Audit Office found that from 2014 to 2015, the UK government allocated £20m to help improve the public’s knowledge of crime carried out on the internet. Yet despite the…
Source: Most UK Adults Do Not Know Where To Look For Cybercrime Advice – Global Dating Insights
Email accounts often contain a lot of personal information, making them a valuable target for hackers and cyber criminals. Make sure yours is protected. Advice from Action Fraud
Source: How to protect your email account from hackers
@th3j35t3r writes on his blog: Simply put. If Jim is blocked by John, Jim can no longer even utter Johns handle/twittername in a tweet. If he attempts to the tweet simply doesn’t process or gets sinkholed. Period. The end. Forever, or until John unblocks him. This approach would not infringe on Jim’s ‘freedom of speech’, he can still say whatever he likes, but he can’t include John. This approach would be self-policing essentially allowing users to decide if they are being abused or harassed and allowing them to take immediate actions without relying on Twitter to minimize the problem effectively. This approach would not be an overhead on Twitters current infrastructure and would require NOTHING by way of extra storage capacity. Trolls are the ugly side of Twitter, but @th3j35t3r’s proposal seems very elegant to me. So how about it Twitter? Find out more, and check out his amusing flowchart, by reading @th3j35t3r’s blog post.
Source: A simple way to kill off Twitter trolls
In the modern world, information security has an influence on all of us: at home, at work, online and in life in general. Like many inventions that have gone before, the internet and the web, the c…
Source: Increase your #Cyber #Safety knowledge with a free three week course – Safe In Warwickshire
The NCSC doesn’t exist yet, but the brand might be used to try and trick people into disclosing information.
Source: The National Cyber Security Centre won’t cold-call you | CESG Site
Apple has just released iOS 9.3.4, the latest versions of its mobile operating system for iPhone and iPad users, and owners of the devices are recommended to upgrade… #apple #ios934securityhole
Source: iOS 9.3.4 released, fixing critical security hole. Update now – HOTforSecurity
An interesting article from Help Net Security. Do you find the urge to click on doubtful linksirresistible?
The the right combination of curiosity, context, and emotions will always beat security awareness training, says researcher Zinaida Benenson.
Source: Security awareness training or no, users will keep clicking on dodgy links – Help Net Security