protection

now browsing by tag

 
 

Cybersecurity and Data Protection Laws: Change is Coming

Source: National Cyber Security – Produced By Gregory Evans

Cybersecurity and Data Protection Laws: Change is Coming

China’s new Cybersecurity Law will become effective on June 1, 2017. In addition to focusing on cybersecurity, the law also details how companies are to handle personal information and data. In determining what is allowed and not allowed for handling personal information in China, it is important to examine The Decision on Strengthening Information Protection on Networks (2012), The Guidelines …

The post Cybersecurity and Data Protection Laws: Change is Coming appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Password tool uses neural network for secure protection from hackers

Source: National Cyber Security – Produced By Gregory Evans

Password tool uses neural network for secure protection from hackers

A state-of-the-art password meter that offers real-time feedback and advice to help people create better passwords has been developed by researchers from Carnegie Mellon University and the University of Chicago. One of the most popular passwords in 2016 was “qwertyuiop,” even though most password meters will tell you how weak that is. Many existing meters also fail to offer good …

The post Password tool uses neural network for secure protection from hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

U.S. Spy Agencies Leave Americans Vulnerable to Hackers In the Name of “Protection”

Source: National Cyber Security – Produced By Gregory Evans

If those of us who regularly use the Internet for work, recreation, shopping, and more find ourselves increasingly vulnerable to hackers, malware, spies and cyber-thieves out to steal our personal information, we have U.S. intelligence agencies to thank. Furthermore, those …

The post U.S. Spy Agencies Leave Americans Vulnerable to Hackers In the Name of “Protection” appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Mobile users rarely pay for malware protection

Source: National Cyber Security – Produced By Gregory Evans

Mobile users rarely pay for malware protection

Almost nine in ten (89 per cent) of mobile consumers don’t pay for mobile protection, despite the fact that mobile malware is running rampant. Consumers would, however, gladly do it (61 per cent of them), if their mobile operators would …

The post Mobile users rarely pay for malware protection appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The Art of Cyber War Adaptive Threat Protection

7

Source: National Cyber Security – Produced By Gregory Evans

The Art of Cyber War Adaptive Threat Protection

Read More….

The post The Art of Cyber War Adaptive Threat Protection appeared first on National Cyber Security.

View full post on National Cyber Security

KATC Investigates Protection Against Identity Theft

Source: National Cyber Security – Produced By Gregory Evans

KATC Investigates Protection Against Identity Theft

Odds are, you know someone who’s been a victim of identity theft. According to the Bureau of Justice, close to 18 million people experienced some form of the crime just last year. That’s five times more than the entire population of Louisiana. Almost all of the victims say someone tried to use an existing bank account. About half had someone use their credit cards without their approval. And nine out of ten people say the culprit, is a total stranger. These crooks use any means to get a hold of your personal information, but could you be handing it over without even knowing it? You’ll be surprised with what we uncovered, just like the viewers we surprised right at their own front doors. There’s an old saying, that “one man’s trash is another man’s treasure.” And if you’re an identity thief, a junkyard could be a gold mine. We took our cell phones and went to a scrap yard right here in Acadiana…and what we found was startling. Just take a look at some of the things that we’ve found. We’ve got banking information; we’ve got what bank this person goes to, including their name. And we have their accounting […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post KATC Investigates Protection Against Identity Theft appeared first on National Cyber Security.

View full post on National Cyber Security

Protection focus of cyber security conference

Source: National Cyber Security – Produced By Gregory Evans

“Many criminal and adversaries use hacking techniques to do bad things, but at the same time many of the hackers that are here think we are a national resource and something to be cultivated, not feared,” Bryan Fite, organizer of the ninth-annual Day-Con Hacker Conference called “Day Con Nine 2015 // Nowhere to Hide,” told News Center 7 Reporter Rachel Murray on Thursday. “The sensors ..and these automated systems the drones that are going to be with us now into the future,” Fite said. “We are going to have to cohabitate with the Internet of dangerous things.” Fite, Matthias Luft with German cyber security company ERNW and other convention attendees say you can protect yourself and your online data by taking a few choice steps: * Choose strong passwords, * Don’t use the same password for multiple accounts, * Don’t click on everything you get via email or instant message, * Don’t click on attachments unless you are really sure it’s valid. Source: http://www.whio.com/news/news/local/protection-focus-of-cyber-security-conference/nn4DW/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Protection focus of cyber security conference appeared first on National Cyber Security.

View full post on National Cyber Security

Mechanicsburg Area School Board amends child abuse protection policies

The Mechanicsburg Area School Board Tuesday night voted unanimously to approve largely technical changes to its policies on volunteers and child abuse based on recent changes to state laws.

The board had it first review of the policy changes last month.

The state law changes extend all required clearances for five years instead of three.

Also, the phrase “routine interaction” with children has been changed to “regular, repeated and continual contact that is integral to a person’s employment or volunteer responsibilities.”

Volunteers who were not state residents for the previous 10 years were required to obtain the FBI clearance. Now, if they have obtained an FBI clearance since establishing Pennsylvania residency, they need not do it again.

Read More

The post Mechanicsburg Area School Board amends child abuse protection policies appeared first on Parent Security Online.

View full post on Parent Security Online

Child protection experts warn YouTube age restrictions on music videos won’t work

images_2Age restrictions have been placed on some music videos following an agreement between YouTube and Vemo and government ministers to help prevent children watching violent and sexually explicit content. However, online safety analysts at the National Society for the Prevention of Cruelty to Children (NSPCC) have warned that children can easily get around the age verification systems.

The British Board of Film Classification (BBFC) recently viewed 132 music videos from UK record labels and placed age ratings on them in the same way films are rated. YouTube and Vemo agreed to work with the BBFC and government to implement age restriction verification systems

Julia Fossi, a senior analyst in the online safety team at the NSPCC, said that age verification systems on sites like YouTube and Vemo “can be easily bypassed”, and they needed to be strengthened.

Read More

The post Child protection experts warn YouTube age restrictions on music videos won’t work appeared first on Parent Security Online.

View full post on Parent Security Online

IRS Offers Tax Guidance On Free Identity Theft Protection Services

Source: National Cyber Security – Produced By Gregory Evans

There’s no question that identity theft is a problem in the United States. A 2015 study released by Javelin Strategy & Research found that there were 12.7 million victims of identity theft in the U.S. 2014. That works out to a new identity fraud victim every two seconds. Identity theft has topped the list of consumer complaints made to the Federal Trade Commission for the last 15 years. And, of course, identity theft has claimed the top spot on the Internal Revenue Service’s (IRS) Dirty Dozen list for several years running. It should be no surprise, then, that businesses and other organizations have ramped up their efforts to keep personal information secure, including offering complimentary identity protection services to customers and employees. This includes credit reporting and monitoring services – the same kinds of services that IRS offered to affected taxpayers earlier this year after taxpayer accounts were improperly accessed using the “Get Transcript” app. These services cost money. Services can range from one time fees to monthly fees upwards of $30 per month. According to Consumer Reports, about 50 million U.S. consumers spent $3.5 billion in 2010 on various identity protection products, a number that has likely grown over […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post IRS Offers Tax Guidance On Free Identity Theft Protection Services appeared first on National Cyber Security.

View full post on National Cyber Security