Shortened URLs: Safe? Or Sabotaged?

Posted by:

Before you click that shortened URL, know the (harsh) facts.

Short links, shortened URLs, tiny URLs: Whatever you call them, they’re everywhere. More than 200 link-shortening services—including the popular Bitly, TinyURL, Google URL Shortener, and Twitter’s link service—turn millions of long, unwieldy URLs into short, spiffy links.

The convenience factor is clear. Sometimes you don’t want a four-line link filled with crazy characters cluttering your email or Facebook post. Platforms like Twitter have rigid character counts ...

Continue Reading →
0

Is the Internet of Things Safe? How to Protect Your Devices.

Posted by:

The Internet of Things connects us and our devices in amazing ways. But it can also wreak havoc on our world.

If you’d never heard of the Internet of Things (IoT), you likely know it now. On Friday, October 21, a massive Distributed Denial of Service attack pummeled popular sites like Google, Twitter, PayPal, the New York Times, and Spotify—crippling them for hours and frustrating millions of users.

The strike targeted the servers at a DNS-services company ...

Continue Reading →
0

How to Recognize Social Engineering Attacks & Avoid Getting Hacked

Posted by:

Clever hackers are getting so devious that even IT folks fall for their ploys. Learn how to identify and avoid social engineering attacks.

Social engineers prey on human nature, attacking people’s vulnerabilities—fear, greed, naiveté, and kindness—to get what they want.

And what do they want? Your money, your credentials, your intellectual property, your contact list….

It’s easier to manipulate humans than it is to figure out how to hack your software. This makes social engineering attractive to crooks.

Tricksters may strike via phone, ...

Continue Reading →
0

Why You Need Strong Passwords & How to Create Them

Posted by:

Think creating strong passwords is a pain? It’s really not. And getting hacked is far more painful.

The call to create tough-to-crack passwords gets louder every year. And still, scores of people ignore it.

Case in point: Computerworld’s list of the worst, most common passwords for the last five years. Topping the chart in 2015 were:

  1. 123456
  2. password
  3. 12345678
  4. qwerty
  5. 12345
  6. 123456789
  7. football
  8. 1234
  9. 1234567
  10. baseball

Not terribly creative—and worse—easily hackable.

Weak passwords pose a huge security risk, enabling crooks to break into private accounts.

Things get worse when people use one ...

Continue Reading →
0

Malware on Social Media: It’s Spreading. How to Protect Yourself.

Posted by:

It’s easy to be relaxed and unguarded when roaming around Facebook. But with the rise of malware on social media, you better amp up the vigilance.

Email phishing and spear phishing attacks are a popular way for cyber scammers to spread malware. But social-media platforms pose significant threats, too.

Facebook, LinkedIn, Twitter, and the like are goldmines of juicy information for crooks.

Once they gather enough personal details from your profile and posts, they can target you with ...

Continue Reading →
0

Why You Need to Switch to HTTPS Now

Posted by:

Choosing to encrypt a website is becoming less and less of a choice for site owners. The switch to HTTPS is quickly becoming non-negotiable.

Thank the big players out there for making it highly desirable—if not mandatory—for HTTP sites to go HTTPS.

For example:

  • Google has clearly stated that HTTPS is an important ranking factor. No one wants to get lost in the search shuffle.
  • In 2017, WordPress—the open-source website-creation tool used by millions—will require hosts to make HTTPS available ...
Continue Reading →
0

Hacked Website: Myth Versus Reality

Posted by:

Yes, a hacked website can happen to your school. Here, the myths, misinformation, and truths. Plus, tips for protecting yourself.

If you surfed the Internet in 1994, you could probably have gone to all 3,000 websites. (And back then, a hacked website was rare.) Today, you’d be hard pressed to visit even a tiny fraction of the billion-plus sites out there.

Exponential growth has come at a price: About one percent—or ten million—of these websites are hacked or infected.

While your ...

Continue Reading →
0

Dirty, Rotten Phish

Posted by:

Email phishing scams are flooding the Internet: How not to get lured in.

Nearly 85 percent of American and British organizations have been victims of phishing attacks, most delivered by email (other popular vehicles include mobile devices, social media, and phone calls).

Financial loss, productivity slowdown, and reputation damage are just some of the consequences companies like Seagate, Snapchat, and (ironically) the web-security company KnowBe4 have suffered after a strike.

Schools are juicy prey, too. And all it takes is one—just ...

Continue Reading →
1

Ransomware: It Can Happen to You

Posted by:

An old cybercrime that first surfaced in the late ‘80s, ransomware has re-emerged as a sinister plague.

It can infect school networks—and pretty much everyone else on the planet who has access to a computer and the Internet.

According to the FBI, ransomware victims in the U.S. doled out $209 million in first quarter 2016, compared to $24 million for all of 2015.

Ransomware sites are propagating like mad, reports Infoblox,with a 3,500 percent increase in first quarter 2016 over ...

Continue Reading →
0

Social-Engineering Attacks. You’re More Vulnerable Than You Think.

Posted by:

Are your endusers vulnerable to social engineering? The scammers are counting on it.

You’ve gone to great lengths to protect your school network with firewalls, filters, and anti-virus software. But you’ve still got a weak link (or hundreds). It’s called your end-user. Any one of staff members or students could fall for a social-engineering scam that devastates your entire system.

Hackers are increasingly clever and sophisticated as they “socially engineer” their victims into taking some sort of ...

Continue Reading →
0
Page 1 of 2 12