Top Five Safeguards Against Online Predators.

Submitted by James Azar on Fri, 10/19/2018 - 11:41
Top Five Safeguards Against Online Predators.
Top Five Safeguards Against Online Predators.

Every day millions of us are opening our homes to online predators and leaving our children vulnerable to becoming victims, simply through our WIFI connection. 

Sickening global networks alongside lone-wolves find a way to contact your kids, such as in the recent Fortnite scandal that exposed a large pedophile ring, thankfully brought down by the combined resources of national and international police forces. With Fortnite being the most popular game ever, this is worrying and sadly, most likely to be the tip of the iceberg. 


Hacker Revenge

Submitted by James Azar on Fri, 10/19/2018 - 11:15
Hacker Revenge
Hacker Revenge

Whilst we all like to think that we treat our employees fairly and when we part ways employees and sub-contractors have the maturity and decency to move on, we know that bruised egos and inside company knowledge, paints a very different picture for commercial break ups. 

The tech world is no different. Disgruntled employees who are cyber smart are particularly worrying and there are numerous attacks that have provided a great reality check for employers.... sometimes it helps to be a little paranoid. 


The Story so far.. Top 5 Hacks of 2018

Submitted by James Azar on Fri, 10/19/2018 - 10:46
The Story so far.. Top 5 Hacks of 2018
The Story so far.. Top 5 Hacks of 2018

We are knee deep in the Fall of 2018 already and the expectations of a Cyber security filled 2019 are very high.  

We wanted to take a break and summarize key cyber-attacks that took place this year. The numbers are staggering and one clear trend emerges, hackers are getting smarter. 

2018 showed that cyber security attacks are far worse both in quantity and severity.

Here are the top 5 hacks that happened in 2018:

1. Facebook - March 2018

87 million records breached


The next Cambridge Analytica?

Submitted by James Azar on Fri, 10/12/2018 - 10:17
The next Cambridge Analytica?
The next Cambridge Analytica?

Facebook are facing a fresh new cyber security scandal in the wake of last weeks' hacking news. 

Hackageddon 

Last Friday, Facebook forced 90million users to log out and back in, due to a security breach affecting 2.5% of their 2 billion-strong user-base. It appears that hackers have been exploiting three security vulnerabilities, and 50 million access tokens had been stolen. 


Six Top Tips for Cyber Security

Submitted by CyberHub Summit on Wed, 09/26/2018 - 17:01
Six Top Tips for Cyber Security
Six Top Tips for Cyber Security

Although everyone nods their head and claims to know the basics of cyber security, such as staff awareness, multiple passwords and multi-factor authentication – there are hundreds of different tricks and tips to stay ahead of the cyber crime game.

With masses at our fingertips we have sourced six stunning tips that get you to take small but important actions and will expand your safety net:

Security Tip 1

Big brother is watching you.


Are you being watched?

Submitted by James Azar on Wed, 09/26/2018 - 16:20
Are you being watched?
Are you being watched?

Maybe.

Pegasus, a potent cell phone spyware program, previously known to have infected both Android and iPhone, is now believed to be present in over 45 countries.

Citizen Lab reported finding 36 Pegasus operators in 45 countries, 10 of which are involved in cross-border espionage.  Citizen Lab further suggested that some of these countries are known to use spyware with the intention to target private citizens, these have formerly included Animal rights activists.


Politicians, Twitter, and the Public Record

Submitted by James Azar on Fri, 09/14/2018 - 16:57
Politicians, Twitter, and the Public Record
Politicians, Twitter, and the Public Record

Politicians across the world have embraced Twitter as a way to directly connect with the public.  It’s common for political offices to have an official account that is passed along to the next official. However, in recent years, we’re seeing a new trend: politicians issuing messages about official duties, but from an “unofficial” account. It might be a personal account that the official had before assuming office, or it might be an account that appeared outside official channels.


How Russian Twitter Bots Weaponize Social Media

Submitted by James Azar on Fri, 09/14/2018 - 16:37
How Russian Twitter Bots Weaponize Social Media
How Russian Twitter Bots Weaponize Social Media

Social media, a new technology which once promised to bring the world together, is now being used to drive divisions in society. A recent news article detailed how Russian bots exploited mentions of Molly Tibbetts's death to distract from the Paul Manafort verdict are part of a coordinated campaign. Here at SafeGuard Cyber, we have spent months studying these bots.