Artwork

内容由Craig Peterson提供。所有播客内容(包括剧集、图形和播客描述)均由 Craig Peterson 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint - Generation Z is the least cyber secure - Security and the Electric Vehicle Charging Infrastructure Failing US

1:26:36
 
分享
 

Manage episode 354428272 series 1107025
内容由Craig Peterson提供。所有播客内容(包括剧集、图形和播客描述)均由 Craig Peterson 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint

The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers…

https://craigpeterson.com/browsers/a-step-by-step-guide-to-clearing-your-browser-history-and-wipe-away-your-online-footprint/38583/

Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.

They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions' potential consequences, such as identity theft or data breaches.

https://craigpeterson.com/cyber-breaches/small-business-owners-be-wary-of-relying-on-younger-family-members-or-employees-to-manage-their-cybersecurity/38585/

Electric Cars… Security and the Electric Vehicle Charging Infrastructure Failing US

https://www.darkreading.com/attacks-breaches/security-and-the-electric-vehicle-charging-infrastructure

The communications networks that connect chargers with their management system, the personal data that travels across those networks, the charge-point operators collecting payments, and the grid itself are increasingly vulnerable as the EV ecosystem grows and the attack surface expands. The risks include (but are not limited to):

  • Disruption of operations for public charger networks, rendering large numbers of chargers unusable and interfering with transportation
  • A takeover of charger networks to use the chargers as bots in massive distributed denial-of-service (DDoS) attacks
  • Theft of customers’ personal identifiable information (PII), including payment card information
  • Fraudulent payments for electricity used in EV charging
  • Disruption to the power grid, leading to blackouts and equipment damage
  • Damage to the EV charging provider's reputation
Google… Google Pushes Privacy to the Limit in Updated Terms of Service

https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit

Google has a long history of searching the Play Store, its app repository, for programs that contain malware. Less than a year ago, Google removed multiple apps from the Play Store that had the banking Trojan SharkBot hidden inside.

However, while removing troublesome apps from the Play Store would seem prudent, Google takes this one step further into a legal gray area.

Debbie Reynolds says that Google's ToS is ambiguous because it is unclear precisely what it might block or remove that is "known to be harmful to the device, data or users." The ToS also does not commit Google to tell users when it makes such a deletion.

Ransomware… Ransomware Profits Decline as Victims Dig In, Refuse to Pay

https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay

In another sign that the tide may finally turn against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers.

"Our findings suggest that a combination of factors and best practices — such as security preparedness, sanctions, more stringent insurance policies, and the continued work of researchers — are effective in curbing payments."

"The businesses that are most inclined not to pay are those that are well prepared for a ransomware attack."

Privacy… Why your data is more valuable than you may realize

https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/

The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think.

Use a GPS map app to find a restaurant that specializes in a particular cuisine, and the search provider can ascertain that you eat out, what day of the week you eat out, possibly how frequently, how far you are prepared to travel, possible food preference, the time of day you eat, etc. In this case, the snippet of data was just the name of the restaurant, yet the resulting information that can be deduced from the action can be significant.

Understanding how data is collected and the conclusions that can be drawn is complicated and likely a topic that is interesting when someone explains it but probably too complex for any actions to avoid collection. I would hazard a guess that even those in the know, so to speak, likely give away more information than they realize.

Dark Web…

Business Insiders Pose a Huge Threat – Hunting Insider Threats on the Dark Web

https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web

According to recent research, malicious employees contribute to 20% of incidents, and the attacks that insiders are involved in are, on average, ten times larger than those conducted by external actors. Further data has shown an increase in insider threat attacks over the past two years, as the risk has been exacerbated by remote working through the pandemic.

To minimize insider threats, all organizations should monitor marketplaces, forums, and social media channels for chatter about their company. This helps them to spot the early warning signs of an imminent attack, such as cybercriminals looking for insider knowledge or disgruntled employees making unsavory comments.

  continue reading

500集单集

Artwork
icon分享
 
Manage episode 354428272 series 1107025
内容由Craig Peterson提供。所有播客内容(包括剧集、图形和播客描述)均由 Craig Peterson 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint

The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers…

https://craigpeterson.com/browsers/a-step-by-step-guide-to-clearing-your-browser-history-and-wipe-away-your-online-footprint/38583/

Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security.

They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions' potential consequences, such as identity theft or data breaches.

https://craigpeterson.com/cyber-breaches/small-business-owners-be-wary-of-relying-on-younger-family-members-or-employees-to-manage-their-cybersecurity/38585/

Electric Cars… Security and the Electric Vehicle Charging Infrastructure Failing US

https://www.darkreading.com/attacks-breaches/security-and-the-electric-vehicle-charging-infrastructure

The communications networks that connect chargers with their management system, the personal data that travels across those networks, the charge-point operators collecting payments, and the grid itself are increasingly vulnerable as the EV ecosystem grows and the attack surface expands. The risks include (but are not limited to):

  • Disruption of operations for public charger networks, rendering large numbers of chargers unusable and interfering with transportation
  • A takeover of charger networks to use the chargers as bots in massive distributed denial-of-service (DDoS) attacks
  • Theft of customers’ personal identifiable information (PII), including payment card information
  • Fraudulent payments for electricity used in EV charging
  • Disruption to the power grid, leading to blackouts and equipment damage
  • Damage to the EV charging provider's reputation
Google… Google Pushes Privacy to the Limit in Updated Terms of Service

https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit

Google has a long history of searching the Play Store, its app repository, for programs that contain malware. Less than a year ago, Google removed multiple apps from the Play Store that had the banking Trojan SharkBot hidden inside.

However, while removing troublesome apps from the Play Store would seem prudent, Google takes this one step further into a legal gray area.

Debbie Reynolds says that Google's ToS is ambiguous because it is unclear precisely what it might block or remove that is "known to be harmful to the device, data or users." The ToS also does not commit Google to tell users when it makes such a deletion.

Ransomware… Ransomware Profits Decline as Victims Dig In, Refuse to Pay

https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay

In another sign that the tide may finally turn against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers.

"Our findings suggest that a combination of factors and best practices — such as security preparedness, sanctions, more stringent insurance policies, and the continued work of researchers — are effective in curbing payments."

"The businesses that are most inclined not to pay are those that are well prepared for a ransomware attack."

Privacy… Why your data is more valuable than you may realize

https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/

The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think.

Use a GPS map app to find a restaurant that specializes in a particular cuisine, and the search provider can ascertain that you eat out, what day of the week you eat out, possibly how frequently, how far you are prepared to travel, possible food preference, the time of day you eat, etc. In this case, the snippet of data was just the name of the restaurant, yet the resulting information that can be deduced from the action can be significant.

Understanding how data is collected and the conclusions that can be drawn is complicated and likely a topic that is interesting when someone explains it but probably too complex for any actions to avoid collection. I would hazard a guess that even those in the know, so to speak, likely give away more information than they realize.

Dark Web…

Business Insiders Pose a Huge Threat – Hunting Insider Threats on the Dark Web

https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web

According to recent research, malicious employees contribute to 20% of incidents, and the attacks that insiders are involved in are, on average, ten times larger than those conducted by external actors. Further data has shown an increase in insider threat attacks over the past two years, as the risk has been exacerbated by remote working through the pandemic.

To minimize insider threats, all organizations should monitor marketplaces, forums, and social media channels for chatter about their company. This helps them to spot the early warning signs of an imminent attack, such as cybercriminals looking for insider knowledge or disgruntled employees making unsavory comments.

  continue reading

500集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南