Showing 7 results for:
Popular topics
For many making attempts to teach their older loved one’s anything technical, the response is typically rooted in the fact that it is too hard or can’t be figured out. But, Forbes 30 Under 30 recipient, Fareedah Shaheed is not taking that for an answer. Her response was to create, Sekuva –a tech company that facilitates helping parents keep their children safe navigating virtual spaces. According to USA Today , “The increase in reports tracks in the United States and abroad during the pandemic, experts said. Tips to the National Center for Missing and Exploited Children, the clearinghouse for such information in the United States, nearly doubled from 6.3 million in the first half of 2019 to 12 million through June of this year. Reports of online enticement similarly spiked during that timeframe, from 6,863 to 13,268.” Shaheed created Sekuva with an understanding of the influx of cyber bullying having been a recipient of being bullied as a Black American girl growing up in Saudi...
Many business functions, no matter the industry, use the Internet to send packets of communication which adjust inventory levels, charge credit cards, manage personnel profiles and much more. Since we’re in an ultra-connected society and there’s no going back, there are always online threats that we should be aware of including viruses, malware, trojan horses, ransomware, Social Engineering, man in the middle attacks, phishing and more. According to Verizon’s 2019 Data Breach Investigation Report , 43 percent of breaches targeted the data or processes of small businesses. Even though the threat of cyber attacks is high than its ever been, cyber security remains an afterthought for too many entrepreneurs and business owners — something they’re only focused on after the damage is done. Here are a few steps any diligent business owner who wants to ensure their operations run effectively and safely should take to protect their business data and maintain client and customer trust: 1....
Social media has emerged as a blessing and a curse as it allows us to connect to people anywhere in the world at the simple opening of an app, but also to dangerously overshare in the heat of the moment. It is important to know how to safeguard our online activity and limit exposure when employers or potential employers may search through your social media history to see what we’ve been up to. Unfortunately, many of us have terrible online privacy and security practices that make it easy for us to fall prey and miss opportunities. Operational security is the practice of protecting sensitive information that if put together, can give a clear picture of your movements and habits. Traditionally, operational security was used in the military to protect information from spies. Now, we see that this is a practice Black people should embrace to protect ourselves from unwanted attention and reputation management. Data is the new gold. Trillions of dollars are made globally by companies that...
Microsoft announced it is increasing its cybersecurity for think tanks in the U.S. and abroad, ahead of the European Parliament elections. The company said that it has detected attacks against employees of the German Council on Foreign Relations, The Aspen Institutes in Europe, and The German Marshall Fund through its Threat Intelligence Center and Digital Crimes Unit. “We believe the work of organizations like The German Marshall Fund and its Alliance for Securing Democracy are an essential part of efforts to secure democracies against those who seek to undermine it,” Microsoft Customer Security & Trust Vice President Tom Burt said in a blog post . “Many organizations essential to democracy do not have the resources or expertise to defend themselves against cyberattacks.” The cyber attack targeted more than 100 accounts across Europe between September and December 2018. Microsoft said its ongoing investigation leads it to believe that Strontium, a Russian-linked hacker group,...
Good afternoon and happy Valentine’s Day! If you’re looking to hop on dating apps to find the love of your life today, you should probably chill for a bit. This morning, Coffee Meets Bagel–a popular dating app–announced a data breach to its users via email. It’s not clear how many accounts were impacted and the company says hackers only gained information from users who were on the app before May 2018. Only users’ names and emails were compromised. Financial information or passwords weren’t hacked since the company doesn’t store those details on its users. In an awkwardly timed announcement, the company didn’t go into extreme detail about the particulars of the breach, but it did lay out a plan to protect its users’ information moving forward and said it will seek the efforts of “forensic security experts” to take a look at the nuts and bolts of the company’s infrastructure. It’s also monitoring for more suspicious activity on the platform. Pro tip: Coffee Meets Bagel should send...
Hackers have hijacked dormant Twitter accounts in an attempt to spread Islamic State propaganda, according to reporting from TechCrunch. The hijacks took place ranging from the last few days to the last few months. Hackers were able to get into the accounts using a decade-old flaw in Twitter’s system that did not previously require email or phone number verifications. In November, Twitter removed 9 million bot and spam accounts to prevent those types of accounts from automatically making news ones. “We made progress preventing spammy or suspicious new account creation by requiring new accounts to confirm either an email address or phone number when they sign up to Twitter, and we improved the detection and removal of previously banned accounts who attempt to evade suspension by creating new accounts,” Twitter said in a quarterly filing after removing the accounts. The latest string of hijackers were able to take over by finding older dormant accounts using expired email addresses....
Howard University’s College of Engineering and Architecture is the recipient of a $1 million grant from The National Science Foundation’s HBCU Research Infrastructure for Science and Engineering (HBCU-RISE) that will fund a cyber security research project. “Security Engineering for Resilient Mobile Cyber-Physical Systems” will innovate the cybersecurity field with tasks such as developing reproducible mobile cyber-physical system units, designing and evaluating a federated framework for incident detection and response systems and designing, evaluating and validating the proposed framework, according to the NSF’s official Award Abstract . Howard University’s College of Engineering, Architecture and Computer Sciences Associate Dean Moses Garuba and Associate Professor Danda B. Rawat are the principal investigators of the project. In a press release by Howard University , Dean Achille Messac, Ph.D., College of Engineering and Architecture said, “I am delighted to see our faculty...