HTCS Blogs

now browsing by category

 

Pearl Software Releases Echo Smart.Capture™ For Targeted Cybersecurity Analytics

Pearl Software, the creator of real-time, mobile Internet monitoring and web filtering has released Echo Smart.Capture as part of its cybersecurity product line. Pearl Echo Version 12 R2 now includes the ability to monitor a user’s web browsing while filtering … View full post on National Cyber Security Ventures

Black members of Congress put pressure on FBI to investigate the missing black girls in Washington, DC that inspired a celebrity-driven social media campaign

Black members of Congress are demanding the FBI get involved in the search for a series of missing black girls in Washington DC, in a case that inspired a high-profile celebrity campaign.
Congressional Black Caucus chairman Cedric Richmond (D-LA), and Del. Eleanor Holmes Norton, who represents the District in Congress, wrote a letter Tuesday asking Attorney General Jeff Sessions and FBI Director James Comey get involved.
Their letter’s existence emerged after #missingdcgirls was tweeted by LL Cool J, Sean ‘Diddy’ Combs and Selma director Ava DuVernay, among others.

The letter, which was obtained by Associated Press on Thursday, called on Sessions and Comey to put money behind the search for the missing kids.

Read More

The post Black members of Congress put pressure on FBI to investigate the missing black girls in Washington, DC that inspired a celebrity-driven social media campaign appeared first on Parent Security Online.

View full post on Parent Security Online

NATO plans €3 billion investment in satellite bandwidth, cybersecurity

As security threats move online, the NATO Communications and Information Agency wants to strengthen network capabilities. To that end, the alliance plans to invest around €3 billion in satellite bandwidth and stronger cybersecurity, a NATO official confirmed today. The contracts … View full post on National Cyber Security Ventures

Cyber Bullying Warning Over Controversial App ‘SimiSimi’

Parents and teachers should be aware of a new app sweeping through Ireland which is raising concerns of anonymous cyber bullying among students.

The SimiSimi app is marketed as a ‘cute’ artificial intelligence robot which collects user comments on subjects and generates responses based on these comments when questions are posed to it.

These comments are made anonymously by users of the app. Once made, the comments cannot be deleted or reported.

Cyber bullying is a huge risk with apps that promote anonymity. Kids and teenagers feel protected by this anonymity and often do not restrain themselves from making cruel remarks about others.

Read More

The post Cyber Bullying Warning Over Controversial App ‘SimiSimi’ appeared first on Parent Security Online.

View full post on Parent Security Online

I’m Addicted To Online Dating & I Don’t Know How To Stop

Online dating hasn’t been taboo in at least a decade; in fact, it’s now a necessity if you’re looking for love. It seems like everyone is on either Tinder, Bumble, OkCupid, Plenty of Fish, or eHarmony (or all of the above), including me. While I’ve never actually met anyone online that I ended up dating long-term, that hasn’t stopped me from becoming downright obsessed with looking. 1. I LOVE THE RUSH OF MATCHING WITH SOMEONE NEW. Read More….

The post I’m Addicted To Online Dating & I Don’t Know How To Stop appeared first on Dating Scams 101.

View full post on Dating Scams 101

Online businesses that handle credit cards have no internet security

Source: National Cyber Security – Produced By Gregory Evans Tens of thousands of online businesses in the UK who handle credit card details have no internet security measures, new research reveals A survey by 123 Reg, the UK’s largest website provider, has found that 10% of e-commerce websites have … The post Online businesses that […]

The post Online businesses that handle credit cards have no internet security appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

SR. NETWORK ENGINEER IN CHICAGO, IL AT SNI TECHNOLOGY

JOB DESCRIPTION This is a permanent placement opportunity Key Responsibilities: Client Service Delivery Consulting with clients at all levels including C-Level Work closely with the Executive management to improve internal processes and service delivery Oversee projects at lower tier and … View full post on National Cyber Security Ventures

Former teacher sentenced to prison for sex with girl

Daniel J. Brown was 28 when he started a relationship with a 15-year-old Genesee County girl.
When she turned 16, that relationship turned sexual, with Brown picking her up from school and taking her to various locations for sex.
He even entered the school and watched her perform in a play, prosecutors said.
Brown, a former teacher at Genesee Country Christian School in Geneseo, continued the relationship not only in Genesee but in Ontario County, where he lived.
The relationship ended with his arrest by state police in April 2016.
Friday morning Brown was sentenced in Genesee County Court for third-degree criminal sexual act as a result of a plea deal.

Read More

The post Former teacher sentenced to prison for sex with girl appeared first on Parent Security Online.

View full post on Parent Security Online

5 Ways To Know Your Partner Is Cheating

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ If your gut feeling lingers or there is a nagging suspicion that something isn’t right, pay attention to your partner to see if they have been displaying any of the following … View full post on Become007.com

Cyber Security Business Operations Core Services Analyst

Source: National Cyber Security – Produced By Gregory Evans Primary Location: United States,New York,New York Education: Bachelor’s Degree Job Function: Technology Schedule: Full-time Shift: Day Job Employee Status: Regular Travel Time: No Job ID: 17018112   Description   The Cyber Security Business Operations Core Services Team aims at allowing … The post Cyber Security Business […]

The post Cyber Security Business Operations Core Services Analyst appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?