The UK’s leading awareness resource helping protect people, finances, devices and businesses from fraud, abuse and other issues encountered online.
Britain moves towards more active defence in cyberspace, the head of the UK’s new National Cyber Security Centre (NCSC) announces.
An article publised by BBC News of interest to all from large organisations to members of the public.
Facecrooks, THE Social Media Watchdog for Facebook Scams
receives countless reports from people and page administrators that have had their profiles or pages copied by scammers or bullies. The most common scenario is someone copies the name, profile picture and other available photos of their intended victim. The next thing they do is block the person they are impersonating and send friend requests to everyone on the victim’s friends list. This is done to infiltrate their social network.
Tempted to upgrade your old iPhone to a brand new iPhone 7? Learn what safety steps you should take before selling your old device. Via award winning cyber security expert Graham Cluley.
According to the United Nations there are currently over 3 billion Internet users! As we all continue to embrace this sophisticated technology into our daily lives, it is becoming increasingly important for everyone to understand how the web works and for governments, software companies and tech developers to highlight areas of vulnerability for users while offering advice for safeguarding their systems. Possessing a basic understanding of the processes and forms of cybercrime could help prevent online attacks and possibly save you from identity theft, financial losses, stolen documentation or a dead computer.
Source: A Quick Guide to Cyber Security
@th3j35t3r writes on his blog: Simply put. If Jim is blocked by John, Jim can no longer even utter Johns handle/twittername in a tweet. If he attempts to the tweet simply doesn’t process or gets sinkholed. Period. The end. Forever, or until John unblocks him. This approach would not infringe on Jim’s ‘freedom of speech’, he can still say whatever he likes, but he can’t include John. This approach would be self-policing essentially allowing users to decide if they are being abused or harassed and allowing them to take immediate actions without relying on Twitter to minimize the problem effectively. This approach would not be an overhead on Twitters current infrastructure and would require NOTHING by way of extra storage capacity. Trolls are the ugly side of Twitter, but @th3j35t3r’s proposal seems very elegant to me. So how about it Twitter? Find out more, and check out his amusing flowchart, by reading @th3j35t3r’s blog post.
The NCSC doesn’t exist yet, but the brand might be used to try and trick people into disclosing information.