now browsing by tag
Michelle Obama feels Tinder can’t lead to long-term relationship, netizens ‘beg to differ’ | #tinder | #pof | romancescams | #scams
As the former US first lady Michelle Obama recently spoke about modern relationships and why they fail to stand the longevity test, several internet users took to Twitter to dismiss […] View full post on National Cyber Security
Michelle Obama Says Tinder Can’t Lead to Serious Relationships, Millennials Say ‘OK Boomer’ | #tinder | #pof | romancescams | #scams
Michelle Obama recently gave out some dating advice to perfect the art of long-term relationships | Image credit: Reuters Michelle Obama recently opened up about some tips for youngsters on […] View full post on National Cyber Security
On the morning of July 30, Donald Trump took to Twitter, his preferred medium of broad public address, to muse openly about the challenges of holding the upcoming federal election […] View full post on National Cyber Security
Love Island’s Curtis Pritchard says he can’t face dating again after split from Maura Higgins following cheating claims | #tinder | #pof | romancescams | #scams
CURTIS PRITCHARD has revealed he is not looking for another relationship after his split from Maura Higgins.
The pair dated for eight months after meeting on last summer’s Love Island, but split in March after a series of blazing rows and public bust-ups. There were also accusations of cheating.
Speaking about the break-up previously, Curtis said: “It hurt. I wasn’t ready for everyone to know we had split up — I wanted some time.
“It was a shock to see that she had announced it on social media hours later.”
Curtis is now content to remain single for the time being — and insists you will not find him on a dating app any time soon.
He added: “I’m very old-fashioned. I don’t actually like talking to people over a mobile phone or laptop. I’m a very sociable person. I like to be with somebody and talk to them.”
When asked if he had signed up for dating apps such as Tinder, Curtis said: “No.” His older brother, who has been with girlfriend Abbie Quinnen, a fellow dancer, for two years, added: “He’s too lazy for that, honestly.”
The Pritchard brothers have revealed their “end goal” is to become a presenting duo to rival Ant and Dec.
And they are keeping their eyes firmly on that prize — with no distractions.
For dance pro AJ, quitting Strictly just weeks before the pandemic hit put a break on his ambitious career plans.
But dancer AJ Pritchard has no regrets — and no plans to ever go back
Speaking exclusively to The Sun, the 25-year-old, who made it to the latter stages of the BBC1 series last year with YouTube star Saffron Barker said: “I made a decision and I’m very happy with that decision.
“I felt like coming out on what was a complete high.
“That last year with Saffron was a fantastic year, and if you don’t move forward and keep striving for what is your end goal, you won’t be able to make that jump.
“To wait another year just didn’t feel right for me. I won’t ever go back.”
AJ was the second big Strictly name to announce their departure this year, after Kevin Clifton quit the show in March.
In his four years there, AJ’s highest finish was fourth with Team GB gymnast Claudia Fragapane in 2016.
However, his most memorable series came the following year with singer Mollie King from The Saturdays, as the pair were rumoured to be getting close away from the dance floor.
TV chiefs are still trying to replace AJ and Kevin for the upcoming series, which is set to go ahead despite the complications from Covid-19.
AJ is backing plans for the show to return, but admits there will obviously be draw-backs.
He says: “There are things you can do to still work with social distancing, whether that be dances like the Charleston or jive.
“You can create routines where you don’t have to be close together. I think the professional group numbers are the one thing that could fall short this year. Usually the professionals learn them as a group.”
And he joked: “You could replay all the numbers from the past few years — and then I’ll be back on the TV.”
‘WE WANT TO BE LIKE ANT & DEC’
In recent months, AJ and Curtis have got a taste of their dream jobs as a presenting duo with an appearance on the BBC’s Big Night In charity appeal for those affected by coronavirus.
But their ultimate aim is to bag a prime-time Saturday night variety show, such as Britain’s Got Talent, which AJ appeared on as a contestant in 2013 with dance partner Chloe Hewitt.
AJ said: “Our aim is to get roles on big shiny floor TV shows and to become a household name as presenters.
“We want to definitely get our own shows commissioned and be like Ant and Dec.
“My first TV appearance was on Britain’s Got Talent. Doing some presenting on a variety show like that would be an absolute dream for me.”
The boys were tight-lipped on whether they had been in any meetings to discuss their own series yet, but did confirm nothing had been commissioned.
Curtis added: “We would absolutely love to be presenters.
“BGT is a prestigious and incredible show so hosting something like that would be a bit of a dream come true.”
‘I NEVER WANTED TO BE LABELLED DYSLEXIC’
But with both boys suffering from dyslexia, reading autocues on live shows can be extremely difficult.
Instead, they have to learn their lines ahead of time.
AJ said: “Reading the full text and learning lines can be difficult with dyslexia.
“We do work that bit harder, but I think that TV producers see that and adapt to work with us.”
The boys, who this month became ambassadors for the British Dyslexia Association, credit their dyslexia with making them creative people and for steering them towards dancing.
But they were not always pleased with being a bit different.Curtis said: “I never wanted to be labelled dyslexic for a couple of reasons.
“I was scared of it and I thought it was a bad thing — that I’ve got a problem or something, when in reality I couldn’t have been more wrong because it moulded me into the person I am today.
“And really it’s actually made me more creative and expressive and more knowledgeable.” With their creativity and upbeat attitude, all the brothers need now is for the TV industry to come back to full strength after lockdown.
Match of the Day 2 presenter Mark Chapman’s wife dies at 44 after long illness
Daniel and Majella leave fans in stitches as they struggle with live stream
these old things?
Braless Amanda Holden laughs off the attention after ‘old breasts’ joke
Singer Sandy Kelly opens up about lockdown struggle with special needs daughter
Inside Amy Huberman and Brian O’Driscoll’s €1.8m dream home in Rathmines
Kathryn Thomas shares adorable photo of daughter Ellie ‘looking for snails’
And they are confident it will.
AJ said: “We’re both in the same mindset to move forward with that career.
“But the entertainment side will bounce back because people need to be entertained and want to have fun.”
GOT a story? RING The Sun on 0207 782 4104 or WHATSAPP on 07423720250 or EMAIL email@example.com
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The post Love Island’s Curtis Pritchard says he can’t face dating again after split from Maura Higgins following cheating claims | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.
View full post on National Cyber Security
You’ve got two choices, employee: a) let us slide a syringe between your thumb and index finger so we can inject a rice-sized microchip into your hand that can be used as a swipe card to open doors, clock in, operate printers or buy junk out of the snack machine, or b) find another job.
An improbable scenario? Yes. It doesn’t happen – at least not if employees say no… For now. And the US state of Indiana wants to make sure it stays that way.
Last week, the state House of Representatives unanimously passed legislation – House Bill 1143 – stipulating that employers can’t force their employees to have an ID or tracking chip implanted in their bodies as a condition of employment. The bill passed the House 96-0 and is now heading to the Senate for consideration.
The bill’s sponsor, Rep. Alan Morrison, acknowledged that there aren’t any companies in Indiana – or anywhere, for that matter – currently forcing workers to be chipped if they want to keep their jobs, but there are businesses using the technology on a voluntary basis. As the Indiana Lawyer reports, Morrison said that he wants to be sure employers don’t “overstep their bounds” by imposing mandatory employee microchipping.
Privacy is an important thing. I don’t think there’s anything wrong with us being a little out in front of something.
Sure thing, said State Rep. Karlee Macer, who voted for the bill. On the other hand, we could spend our time legislating about issues that actually exist. NWI quoted her:
Think of the hundreds of bills that are sitting and waiting and never getting a hearing. There are a lot of important things we need to be doing in the state of Indiana.
But it’s so convenient!
There are at least two businesses that are using optional microchipping in their employees: Swedish startup hub Epicenter and Wisconsin-based Three Market Square.
At Epicenter, the injections have become so popular, they have parties for employees willing to undergo the procedure, as CNBC reported about three years ago (it’s been going on for years, in other words). It sounds kind of like a bris, except something gets added instead of snipped off.
CNBC quoted Patrick Mesterton, Epicenter’s co-founder and CEO, who said – while unlocking a nearby door by waving his hand at it – that it beats a bunch of pocket-stuffers:
The biggest benefit I think is convenience. It basically replaces a lot of things you have, other communication devices, whether it be credit cards or keys.
Mesterton said that even he had his doubts initially. The technology does raise security and privacy issues: the chips are safe biologically, but they generate data about how often employees come to work or what they buy. While you can stifle company swipe cards or mobile phones, it’s quite another prospect to rip a chip out of your flesh.
And as far as squeamishness goes, Mesterton compared the microchip to all the medical gadgets we’re putting in our bodies these days:
I mean, people have been implanting things into their body, like pacemakers and stuff to control your heart. That’s a way, way more serious thing than having a small chip that can actually communicate with devices.
For what it’s worth, Wisconsin-based Three Market Square also had a chipping party for willing employees back in August 2017. Their feedback: it was “just a little prick.”
According to the Chicago Tribune, officials said that the data in the microchip is encrypted and doesn’t use GPS, so it can’t be used to track employees or obtain their private information.
Hey, we’ve been microchipping our dogs and cats for years. What do you think, readers: ready to hold out your paws?
Latest Naked Security podcast
Click-and-drag on the soundwaves below to skip to any point in the podcast.
The post Employers can’t force you to get microchipped, Indiana reps say – Naked Security appeared first on National Cyber Security.
View full post on National Cyber Security
Experts agree that it’s long past time for companies to stop relying on traditional passwords. They should switch to more secure access methods like multi-factor authentication (MFA), biometrics, and single sign-on (SSO) systems. According to the latest Verizon Data Breach Investigations Report, 81 percent of hacking-related breaches involved either stolen or weak passwords.
First, let’s talk about password hacking techniques. The story is different when the target is a company, an individual, or the general public, but the end result is usually the same. The hacker wins.
Breaking passwords from hashed password files
If all a company’s passwords are cracked at once, it’s usually because a password file was stolen. Some companies have lists of plain-text passwords, while security-conscious enterprises generally keep their password files in hashed form. Hashed files are used to protect passwords for domain controllers, enterprise authentication platforms like LDAP and Active Directory, and many other systems, says Brian Contos, CISO at Verodin, Inc.
These hashes, including salted hashes, are no longer very secure. Hashes scramble passwords in such a way that they can’t be unscrambled again. To check if a password is valid, the login system scrambles the password a user enters and compares it to the previously hashed password already on file.
Attackers who get their hands on a hashed password file use something called “rainbow tables” to decipher the hashes using simple searches. They can also buy special-built hardware designed for password cracking, rent space from public cloud providers like Amazon or Microsoft, or build or rent botnets to do the processing.
Attackers who aren’t password-cracking experts themselves can outsource. “I can rent these services for a couple of hours, couple of days, or a couple of weeks — and usually that comes with support, as well,” Contos says. “You see a lot of specialization in this space.”
As a result, the times it takes to break hashed passwords, even ones previously thought of as secure, is no longer millions of years. “Based on my experience of how people create passwords, you’ll usually crack 80 to 90 percent in less than 24 hours,” he says. “Given enough time and resources, you can crack any password. The difference is whether it takes hours, days, or weeks.”
This is especially true of any password that is created by humans, instead of randomly generated by computer. A longer password, such as a passphrase, is good practice when users need something they can remember, he says, but it’s no replacement for strong MFA.
Stolen hash files are particularly vulnerable because all the work is done on the attacker’s computer. There’s no need to send a trial password to a website or application to see if it works.
“We at Coalfire Labs prefer Hashcat and have a dedicated cracking machine supplemented with multiple graphics processing units that are used to crunch those password lists through the cryptographic hashing algorithms,” says Justin Angel, security researcher at Coalfire Labs. “It isn’t uncommon for us to recover thousands of passwords overnight using this approach.”
Botnets enable mass-market attacks
For attacks against large public sites, attackers use botnets to try out different combinations of logins and passwords. They use lists of login credentials stolen from other sites and lists of passwords that people commonly use.
According to Philip Lieberman, president at Lieberman Software Corp., these lists are available for free, or at low cost, and include login information on about 40 percent of all internet users. “Past breaches of companies like Yahoo have created massive databases that criminals can use,” he says.
Often, those passwords stay valid for a long time. “Even post-breach, many users will not change their already breached password,” says Roman Blachman, CTO at Preempt Security.
Say, for example, a hacker wants to get into bank accounts. Logging into the same account several times will trigger alerts, lock-outs, or other security measures. So, they start with a giant list of known email address and then grab a list of the most common passwords that people use, says Lance Cottrell, chief scientist at Ntrepid Corp. “They try logging into every single one of the email addresses with the most common password,” he says. “So each account only gets one failure.”
They wait a couple of days and then try each of those email address with the next most common password. “They can use their botnet of a million compromised computers, so the target website doesn’t see all the attempts coming in from a single source, either,” he added.
The industry is beginning to address the problem. The use of third-party authentication services like LinkedIn, Facebook, or Google helps reduce the number of passwords that users have to remember. Two-factor authentication (2FA) is becoming common with the major cloud vendors as well with financial services sites and major retailers.
Standards setting bodies are stepping up, as well, says James Bettke, security researcher at SecureWorks. In June, NIST released a set of updated Digital Identity Guidelines that specifically address the issue. “It acknowledges that password complexity requirements and periodic resets actually lead to weaker passwords,” he says. “Password fatigue causes users to reuse passwords and recycle predictable patterns.”
The FIDO alliance is also working to promote strong authentication standards, says Michael Magrath, director of global regulations and standards at VASCO Data Security. “Static passwords are not safe nor are they secure,” he says.
In addition to the standards, there are also new “frictionless” technologies such as behavioral biometrics and facial recognition that can help improve security on consumer websites and mobile apps.
Is your password already stolen?
To target an individual, attackers check if that user’s credentials have already been stolen from other sites on the likely chance that the same password, or a similar password, was used. “The LinkedIn breach a few years back is a good example,” says Gary Weiss, senior vice president and general manager for security, analytics, and discovery at OpenText Corp. “Hackers nabbed Mark Zuckerberg’s LinkedIn password and were able to access other platforms because he apparently re-used it across other social media.”
The average person has 150 accounts that require passwords, according to research from Dashlane, a company that offers a password management tool. That’s too many passwords to remember, so most people use just one or two passwords, with some simple variations. That’s a problem.
“There is a common misconception asserting that if you have one very complicated password, you can use it everywhere and remain protected,” says Emmanuel Schalit, CEO at Dashlane Inc. “This is categorically false. Hacks are reported after it is too late, at which point your one very complicated password is already compromised, and so is all of your information.” (You can see if your password-protected accounts have been compromised at have I been pwned?.)
Once any one site is hacked and that password stolen, it can be leveraged to access other accounts. If the hackers can get into their user’s email account, they will use that to reset the user’s password everywhere else. “You might have a very good password on your bank or investment account, but if your gmail account doesn’t have a good password on it, and they can break into that, and that’s your password recovery email, they’ll own you,” Cottrell says. “There’s a number of high profile people who have been taken down by password reset attacks.”
If they find a site or an internal enterprise application that doesn’t limit login attempts, the will also try to brute-force the password by using lists of common passwords, dictionary lookup tables, and password cracking tools like John the Ripper, Hashcat, or Mimikatz.
Commercial services are available in the criminal underground that use more sophisticated algorithms to crack passwords. These services have been greatly helped by the continued leaks of password files, says Abbas Haider Ali, CTO at xMatters, Inc.
Anything a human being can think of — replacing letters with symbols, using tricky abbreviations or keyboard patterns or unusual names from science fiction novels — someone else has already thought of. “It doesn’t matter how smart you are, human-generated passwords are completely pointless,” he says.
The password-cracker apps and tools have become very sophisticated over the years, says Ntrepid’s Cottrell. “But humans haven’t gotten much better at picking passwords,” he says.
For a high-value target, the attackers will also research them to find information that can help them answer security recovery questions. User accounts are typically just email addresses, he added, and corporate email addresses in particular are very easy to guess because they are standardized.
How to check the strength of your password
Most websites do a very poor job of telling users whether their chosen password is strong or not. They are usually several years out of date, and look for things like a length of at least eight characters, a mix of upper- and lowercase letters, and symbols and numbers.
Third-party sites will gauge the strength of your password, but users should be careful about which sites they use. “The worst thing in the world to do is go to a random website and type in a password to have it test it,” says Cottrell.
But if you’re curious about how long a password would take to crack, one website you can try is Dashlane’s HowSecureIsMyPassword.net. Another site that measures password strength, checking for dictionary words, leet-speak, and common patterns, is the Entropy Testing Meter by software engineer Aaron Toponce. He recommends choosing a password with at least 70 bits of entropy. Again, he recommends not typing your actual passwords into the site.
For most users — and for the websites and applications they log into — this creates a problem. How are users expected to come up with unique passwords for each site, and change them every three months, long enough to be secure, and still remember them?
“A rule of thumb is, if you can remember it, it isn’t a good password,” says Cottrell. “Certainly, if you can remember more than one or two of them, it isn’t a good password — it’s always a couple of words and the name of the website.”
Instead, he says, use a randomly generated password of the longest length the website allows and store them using a secure password management system. “I have more than 1,000 passwords in my password vault, and they’re almost all over 20 characters,” he says.
Then, for the master password for the vault, he uses a long passphrase. “It should not be a quote, or something from any book, but still memorable to you,” he says. “My recommendation for memorability is that it should be extraordinarily obscene — which also make it less likely that you’ll go and tell anyone. If you’ve got a 30-character phrase, that’s effectively impossible to brute force. The combinatorics just explode.”
For individual passwords for websites or applications, 20 characters is a reasonable length, according to Cyril Leclerc, Dashlane’s head of security — but only if they’re random. “Crackers will be able to crack a human-generated password of 20 characters,” he says, “but not for a randomly generated password. Even if someone had computers from the future with unlimited power, the hacker would potentially only be able to crack a single password, and only after spending an astronomical amount of time on the task.”
The post How #hackers crack #passwords and why you can’t #stop them appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
Most (54%) cybersecurity professionals believe the threat landscape is evolving faster than they can respond, with a lack of preparation and strategic thinking endemic, according to RedSeal.
The network resilience vendor polled 600 IT and security decision makers in the UK and US to compile its RedSeal Resilience Report 2017.
It revealed that most respondents feel they are under-resourced (54%), can’t react quickly enough when an incident strikes (55%) and can’t access insight to prioritize incident response (79%).
Just 20% said they’re extremely confident their organization will be able to function as normal in the event of a breach or attack.
What’s more, there seems to be a dangerous disconnect between perceived strengths and reality.
Some 40% of respondents claimed ‘detection’ is their strongest capability, stating it takes an average of just six hours to spot an incident.
However, this flies in the face of many other industry reports, compiled by the likes of Mandiant (99 days) and Trustwave (49 days).
RedSeal also claimed that only a quarter of respondents test their cybersecurity incident response annually, with many saying it’s too resource intensive (29%), outside their budget (27%) or takes too long (26%).
“Their data networks are dynamic. This dynamic nature creates a risk,” RedSeal CEO Ray Rothrock told Infosecurity.
“Given that they report in our research that they last created a map of their entire network on average nine months ago, there’s no way to know precisely if their most valuable assets are accessible to bad actors at the present time. The lag in knowing what the network looks like and where data lives is a crucial factor in being ready for the inevitable.”
The report also revealed that compliance rather than strategy is driving IT security planning for the vast majority (97%) of organizations.
“On the cyber front, digital resilience — the ability to contain the bad guys when they’re inside your network, and protect high value assets like customer data and content from exfiltration — will protect your networks and your vital financial assets,” concluded Rothrock.
“So, it’s important to know your network inside out. Know what is important to your business and your customers, where it is, and make sure it’s secure. Operational resilience means not only being ready, but having a plan and procedures and then rehearsing that action plan.”
The post Cybersecurity #Pros Can’t Keep #Pace with #Threat #Landscape appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
As a bona fide cryptocurrency skeptic, I’m of two minds on Bitcoin and other cryptos. One, I don’t think we know enough about them to invest in them as if they were stocks and bonds. The transparency isn’t there.
But I also think that the tide of technology and investors isn’t going to be stopped any time soon.
Regulators, of course, are concerned about cryptos. Vehicles are started up every day to invest and speculate in them. According to the Financial Times, the U.K.’s Financial Conduct Authority is eyeing new trading platforms that allow you to bet on crypto movements with as much as 30:1 leverage on derivative contracts linked to Bitcoin.
Where is this all going? As Bitcoin prices blow past $6,000 a share, millions of investors want a piece of the action. Yet there are far too many questions to answer before cryptos become mainstream investments.
In an insightful piece by Karen Webster of pymnts.com, she poses the kinds of questions all investors should be asking:
— Will Bitcoin Actually Replace Traditional Currencies? “No one believes in the merits of a global cryptocurrency, except bitcoin zealots.
The notion that central banks will give up monetary control of their fiat currencies for a global cryptocurrency, especially bitcoin, is just not happening, so we should stop talking about it. Even economists who never agree on anything, agree on that.
Besides, a currency that swings between $1,000 and $5,000 over the course of two years, and between $3,000 and $5,000 in the course of a few weeks, isn’t exactly a good basis for operating a strong and stable foundation for a global financial system.”
— Is Bitcoin A Legitimate Exchange Of Value?“Bitcoin has only two proven use cases after eight years: criminal activity and speculation.
I honestly don’t understand why this continues to be dismissed in the face of mountains of evidence to the contrary. In the eight years since bitcoin has been a currency, transaction volume in the support of legitimate commerce is virtually nil.”
— Is Bitcoin Really Free? “Bitcoin is anything but free. Miners now expect a fee for their work and won’t process transactions for which they are not paid.
That means that those costs are passed down the ecosystem to end users. There’s no such thing as a free lunch, even in the land of bitcoin.”
— Is Bitcoin Immune From Hacking And Fraud?“The rising value of bitcoin has made exchanges prime targets for hacking, and thus has made hacks there quite lucrative.
The Mt. Gox hack netted $500 million, Bitfinex $72 million, Bitcoinica $460,000, Bitfloor $250,000 and Bitstamp $5.2 million. South Korea’s Bithumb hack last summer — the exchange that serves 75 percent of the South Korean market for bitcoin — resulted in tens of millions of dollars lost for the 30,000 customers affected. Even the wallets that store bitcoin are vulnerable.
The FBI reports that some $28 million in losses were reported to them in 2016, triple what they saw in 2015. But that’s only what’s reported.
It’s hard to imagine a money launderer or terrorist emailing the FBI to let them know they were hacked and lost money. That means that no one actually knows how much money has been lost to hacking, but the anonymity and irrevocability associated with bitcoin transactions means that the money lost is also irrecoverable.”
— Is It Too Soon For Crypto Derivatives And Margin Trading? With futures contracts on T-bills and corn, you know exactly what you’re buying. The markets are backed up by regulated exchanges that have been around for 100 years or more.
But with Bitcoin, are you buying bits of computer code or somebody’s wildly irrational idea of what those bits and bytes are worth?
“There’s a lot of interest from active traders and investors,” Claus Nielsen, head of markets at Denmark’s Saxo Bank, which has no immediate plans to offer crypto-CFDs, told The Financial Times.
“But this is not a liquid trading product yet. It’s premature, and not professional, to offer margin trading on cryptocurrencies to the retail segment yet.”
View full post on National Cyber Security Ventures
To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ You can’t keep changing men, so you settle for changing your lipstick. Heather Locklear The post You can’t keep changing men, so ………. appeared first on Dating Scams 101. View full post on Dating Scams 101
View full post on Become007.com
It was only two months ago that the WannaCry ransomware attack hit global computers, creating headlines that warned everyone to update their computers and avoid risky online behaviour. Anyone, and that included companies, who failed to do so was at risk of losing any data stored on their computers. Panic…
View full post on National Cyber Security Ventures