now browsing by tag
After Getting Dumped By Match.com, Whitney Wolfe Herd Is Taking Revenge With $8 Billion Bumble IPO | #tinder | #pof | romancescams | #scams
Not long after college, Whitney Wolfe Herd went to work for dating app Tinder. The story of her crash and burn there and her ousting amid allegations she was discriminated […] View full post on National Cyber Security
#cyberfraud | #cybercriminals | MAS reminds of vigilance against cyber threats taking advantage of coronavirus situation
Source: National Cyber Security – Produced By Gregory Evans SINGAPORE: The Monetary Authority of Singapore (MAS) reminded financial institutions to remain vigilant on the cybersecurity front amid cases of “cyber threat actors” taking advantage of the coronavirus situation to conduct email scams, phishing and ransomware attacks. In a media release on Sunday (Feb 9), MAS said […] View full post on AmIHackerProof.com
A MUM has revealed her heartache over her teenage son’s death – after taking prescription drugs a friend bought on the dark web.
William Horley, 17, from Herne Bay, Kent, had an accidental overdose on painkiller Tramadol, which he took on a night out in July last year.
His mum Kim Webster, 48, told how her son was a sensible lad who didn’t normally do drugs – and knew his future career in the army had a zero tolerance policy.
The project manager said: “Will wasn’t a drug addict. This was an awful accident, a teenager out having fun his friends, making a momentary bad decision and paying the ultimate price.
“Such a terrible waste of a promising young life. Tramadol is a prescription drug and as a naive young person, my son would have assumed that made it safe.
“But of course it isn’t. Any drug is dangerous if it’s not prescribed and not taken in the correct dosage.”
Kim has another son Jack, 22, and twin stepdaughters Hannah and Zoe, 24, through her husband Rob, 53, a builder.
She added: “Will was 6ft 6ins tall, a handsome, sports-mad lad who’d achieved his long term ambition and been accepted into the Royal Artillery.
“He was due to join the army just three months after he passed away. In the meantime, he had a job waiting tables in a restaurant.
“Will was a sensible boy and we had talked about drugs. He always told me ‘Mum, I’m not stupid. I’m going into the army which has a zero tolerance drugs policy’.
“There was one occasion when I caught him smoking a joint and gave him a real rollicking – but what teenager hasn’t done that?
“I had no fears about my son getting involved with drugs, because I believed he’d never put his future in jeopardy.”
Will wasn’t a drug addict. This was an awful accident, a teenager out having fun his friends, making a momentary bad decision and paying the ultimate price
On the day Will died, July 23, he went to the beach in Whitstable with some friends for some beers – after a 12-hour shift working at the seaside town’s Oyster Festival.
Kim said: “I didn’t think anything of it. My last words to him were ‘have a good time and don’t be too late, the key’s under the mat’.
“I went to bed as usual. At 5am the next day, I woke with an uneasy feeling.
“I went into Will’s bedroom and he wasn’t there. That wasn’t typical for him, so I woke my family.
“They thought he’d probably crashed at a friend’s house but I had a nagging feeling something must be wrong.”
Will wasn’t answering his phone, and neither were any of his mates, so his mum set off to look for him in her car.
Kim said: “A couple of hours later, I phoned the restaurant where he worked.
“The manager told me he hadn’t turned up for his shift, but there was a call from a friend who also worked there, reporting them both sick.
Tramadol is a prescription drug and as a naive young person, my son would have assumed that made it safe – but of course it isn’t
“I asked the manager to ring that friend and tell Will to contact me.
“Shortly afterwards, the manager called back and said Will was on his way to hospital.
“Hearing that, I thought perhaps he’d drunk too much. I had no inkling it might be anything to do with drugs.”
But by the time Kim arrived at Margate’s Queen Elizabeth the Queen Mother Hospital, she was told Will had already died.
The heartbroken mum was left to identify her son’s body.
An autopsy revealed that Will was killed by an overdose of the prescription drug Tramadol, which one of his friends is thought to have bought on the dark web.
I tell teenagers how, as a mother, I had to identify my son’s body, break the news he was dead, and decide whether his body should be buried or cremated
Kim said: “Will died because he did something that was out of character for him, when he took a prescription drug to get high.
“It was a naive teenager’s one-off lapse of judgement, but it cost my boy his life.”
Will would have turned 18 that November. In January, an inquest recorded a verdict of Tramadol overdose with pneumonia.
During the hearing, Will’s friend said he had known him to occasionally smoke weed, but this was the first time he was known to have taken Tramadol.
A Kent Police investigation into where the drug came from is ongoing.
One person has been arrested but nobody has been charged with any offence.
In February 2019, Kim asked Will’s school if she could speak to other pupils about the dangers of taking prescription drugs.
Tramadol: the facts
Tramadol is a strong painkiller used to treat moderate to severe pain – i.e. after an operation or serious injury.
It’s only legally available on prescription, to those aged 12 or older.
Like other opiod drugs, overdosing on Tramadol can kill and the drug can be addictive.
In June 2014, Tramadol was upgraded to a Class C substance and placed in Schedule III to the Misuse of Drugs Regulations – in a bid to reduce prescriptions.
It’s estimated one in six teens have taken prescription meds to get high.
Statistics show the vast majority of teenagers who abuse prescription medications obtain them from home and family members.
Addiction Helper advises parents to talk to kids about the dangers of prescription drug abuse, and keep pills in a locked cabinet.
Kim said: “I felt the need to warn other young people, that this could happen to any one of them.
“These drugs are so easy for teenagers to obtain. They don’t have to go out and locate a drug dealer.
“They can find substances to abuse in the family medicine cabinet.
“Or they can order them over the internet from the privacy of their bedroom, then the postman will bring them right to their front door.”
Kim now gives regular talks about the dangers of prescription drugs in schools and colleges across the country.
She said: “Young people think drugs like Tramadol and Xanax are safe because doctors can prescribe them. There are even adverts for prescription drugs popping up on Snapchat, so the temptation’s constant.
“But drugs on the dark web are often mixed with other chemicals, so nobody can be entirely sure what they’re taking.
“I urge young people to think about their family and what would happen to the people they love, if things go wrong.
“I tell them how, as a mother, I had to identify my son’s body, break the news he was dead to his brother, father and grandparents, and decide whether his body should be buried or cremated.
“No mum should ever have to do those things for their child. What I have to tell these teenagers is the truth and it’s very powerful.”
Kim now works with Kent-based rehabilitation unit Kenward Trust – www.kenwardtrust.org – to raise awareness of the dangers of buying prescription drugs.
She said: “It isn’t easy for me to go out and tell a roomful of strangers about how I lost my son.
“I’m still grieving for him – sometimes it feels as if my heart is being squeezed in my chest, to the point that I can’t catch my breath.
Mum creates stunning glittery staircase for a fiver using B&M wrapping paper
‘Exhausted’ new mum shares emotional pic as she begs visitors to stay away
CORRIE ON QUEEN
Corrie’s Samia has ‘mum guilt’ over barely seeing kids when busy filming
Genius hack reveals how to wrap a gift when you’ve cut wrapping paper too small
Needing to pee more when it’s cold can be sign of deadly condition, docs warn
“But I need to get his message out there. Will had his life before him and was about to start living the dreams he’d held since a little boy.
“He didn’t want this to happen to him and wouldn’t want it to happen to others.”
The family have also launched a charity, the Will Horley Foundation, to fund boxing for children in need.
The post #deepweb | <p> My sensible son, 17, died after taking painkiller Tramadol on a night out <p> appeared first on National Cyber Security.
View full post on National Cyber Security
#cybersecurity | #hackerspace | Derbycon2019, Jim Shaver’s ‘API Keys, Now What? Taking The Pen Test Into The Amazon Cloud’
Many Thanks to Adrian Crenshaw (Irongeek), and his Videographer Colleagues for Sharing His and Their Outstanding Videos Of This Last And Important DerbyCon 2019.
Visit Irongeek for additional production credits and additional information. Subscribe to Irongeek’s content, and provide Patreon support as well.
The post Derbycon2019, Jim Shaver’s ‘API Keys, Now What? Taking The Pen Test Into The Amazon Cloud’ appeared first on Security Boulevard.
View full post on National Cyber Security
From phishing schemes to a thief pilfering your passport, there are plenty of ways to fall victim to identity theft. And now, participating in Facebook quizzes is one of them. As ABC News reports, the seemingly harmless surveys that populate your feed could wind up providing unscrupulous hackers with the answers to your online security questions.
Popular Facebook quizzes often ask users to answer a series of sharable personal questions, ranging from the name of their pet to their birth city. Some people see them as a fun way to bond with friends, or a way to make new ones. But as one local police department in Massachusetts recently noted on Facebook, many of these queries are similar—if not identical—to security questions used by banks and other institutions.
“Please be aware of some of the posts you comment on,” the Sutton Police Department in Massachusetts wrote in a cautionary message. “The posts that ask what was your first grade teacher, who was your childhood best friend, your first car, the place you [were] born, your favorite place, your first pet, where did you go on your first flight … Those are the same questions asked when setting up accounts as security questions. You are giving out the answers to your security questions without realizing it.”
Hackers can use these questions to build a profile and hack into your accounts or open lines of credit, the department said. They could also trick you into clicking on malicious links.
Experts say it’s OK to take part in a Facebook quiz, but you should never reveal certain personal facts. Take quizzes only from respected websites, and always carefully vet ones that ask for your email address to access the poll or quiz. And while you’re at it, consider steering clear of viral memes, like this one from 2017, which asked Facebook users to name memorable concerts (yet another common security question).
The post Taking #Facebook #Quizzes Could Put You at #Risk for #Identity Theft appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
Cyber security is essential for organisations of all sizes. Organisations need to ensure they have taken all the necessary precautions to protect their data.
In the past year, 46% of businesses identified at least one cyber attack or breach, with 875,000 of these victims being an SME. Despite these statistics, a recent survey found that many SMEs don’t believe they are at risk, with 59% thinking that their information would be of little value to cyber criminals.
This mindset is a major issue for small businesses because their lack of interest in cyber security makes them a favourable target for criminal hackers.
Why do criminals target SMEs?
Many small businesses do not put enough money and resources into cyber security. They do not monitor or implement strong enough cyber security defences that will adequately protect their data. Not having these defences in place makes their data more susceptible to attacks.
Although they may not feel that their information has much value to criminals, it very often does. Small businesses still hold personal and financial information, but they do not have the security defences in place that large organisations do. This makes them an easy and attractive target.
When an organisation has been hit by a ransomware attack, the criminals responsible will demand it pays a ransom to retrieve its data. It’s very difficult for small businesses to recover from ransomware attacks, so they are often more willing to pay the ransom than larger organisations would be. Again, this makes them an attractive target for many criminals.
How are SMEs being hacked?
The most common ways SMEs are hacked are by phishing, poor passwords and IT vulnerabilities.
Phishing schemes are fake emails that impersonate someone that you may trust: an online provider, bank, popular website or sometimes a colleague. These emails try to trick you into giving away sensitive information.
Passwords are vital for ensuring the security of your data. If a password is easy to guess or used for multiple platforms, it becomes less secure and easier to hack. Passwords should be unique and complex, and should never be shared..
IT vulnerabilities are a result of a network not having the right security measures in place in order to protect data. These vulnerabilities can lead to malware attacking an organisation’s data.
What precautions should SMEs take?
There are many simple ways an SME can protect itself from a cyber attack. Implementing a firewall is one of the first things an organisation should do, as this will put up a barrier between your data and the hacker, restricting their access.
It is very important to educate your employees to follow cyber security procedures. They should complete staff awareness training to ensure they can identify a phishing email, and follow basic security measures such as regularly changing passwords and adopting security policies.
Installing security software is vital to keep your data secure. Even after you have trained your staff, there is still the chance they may fall for a phishing email. Installing anti-malware software will help protect your organisation from malware that may be contained in these types of email.
Evaluate your cyber security posture
Gain a high-level evaluation of your organisation’s cyber security posture and a documented summary of recommendations for improvements with the Cyber Security Audit.
The post How #seriously are #SMEs taking their #cyber security? appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
It is a scary time to do business. Phishing, hacking, identity theft, ransomware, payment fraud: the list of ways that cyber criminals are attacking individuals, companies and governments seems endless. The U.S. Securities and Exchange Commission (SEC) recently referred to cyber threats as “the greatest threat to our markets right now” and for good reason. While recent global attacks like Wannacry and Petya/GoldenEye dominated headlines due to the sheer size of its reach and impact, thousands more acts of cybercrime are committed every single day — almost 50 percent of which target businesses.
But, don’t be fooled into thinking that you have to be a Fortune 500 corporation to be a target. Cybercrime is an equal opportunity menace. Larger mature companies are hit most often, but smaller scale-ups are hit the hardest, and it takes longer for them to recover. Only 14 percent of small businesses rate their ability to mitigate cyber risks, vulnerabilities and attacks as highly effective. In today’s digital economy, winning and maintaining the trust of your customers is central to business growth, and nothing erodes trust quite like a cyber breach.
Scaling customer trust is a very different animal to scaling customer numbers. In fact, it can work in inverse proportion. When there is rapid customer base growth, it puts more strain on the company’s Trust and Safety resources, which in turn, results in an increase in security breaches and a decrease in customer trust. Don’t allow this to happen. Safely and successfully scale the trust of your customers by adopting these three key measures:
1. Take full control of updating your company’s software.
Imagine that your company is a castle. The walls of the castle can break and crumble in places, allowing intruders easy access. So these walls need to be constantly maintained and patched up. If you give everyone working in the castle responsibility for this maintenance, something is going to go wrong somewhere, sometime. One of your team will fill a hole with sand instead of cement, so you need to take full control of it.
It’s the same in a company. A recent survey conducted by research firm Voke Media found that 27 percent of companies reported a failed audit in the prior 18 months. Eighty one percent of those failures could have been prevented with a patch or configuration change. Twenty six percent of companies reported a breach, of which 79 percent could have been prevented with those two measures. In fact, if more individuals and companies kept their software up to date, the devastation caused by the recent Petya attacks would have been minimal.
By using an enterprise network, this critical function will be managed centrally by one expert rather than by many novices.
2. Put human error in the firing line.
Even though the walls of your castle may be fully maintained and secure, a worker may unwittingly open a window or door, giving intruders full access.
Ninety five percent of all security incidents involve human error, according to the 2017 IBM Cyber Security Intelligence Index. Examples include staff clicking links to phishing scams or visiting corruptive websites, and network administrators making small errors with big consequences. For example, it was reported recently that North Korean hackers stole U.S.-South Korea war plans. A contractor working at the data center left a cable in place that connected the military intranet (which had compromised antivirus software installed) to the internet, allowing the North Korean hackers to access sensitive information.
Employees can be helped to recognize scams through prevention training and awareness programs. Make it easy for your employees to report fraudulent emails quickly, and keep testing internally to prove the training is working. Your front line must always be cyber-ready.
3. A.B.C. — Always Be Communicating with your customers.
Tell them what you are doing to keep them safe. Customers value transparency, and the more companies are open with both its customers and employees, the further trust will be established. Take Zappos, for example, who promotes transparency in its Zappos Family Core Values by being completely open with its vendors when it comes to internal information. Instead of trying to hide secrets or use private information to establish leverage, Zappos believes in giving vendors complete visibility. The result is more trusting relationships that strengthen the organization at very foundational levels.
The expertise and time required to successfully introduce all or any of these security measures can be immense, and often difficult to provide in-house. As a result, many fast-growing companies are outsourcing Trust and Safety (TnS) Operations to a partner company, allowing them to focus on core competencies. If this is a route you choose to take, be sure to demand the same level of trustworthiness from them, as your customers do from you. And here’s how to do it:
Find a partner who has a proven track record of delivering top quality TnS services.
A premium BPO will routinely outperform its partner’s Net Promoter Scores (NPS) scores and will have the data to prove it. Providing value added, high touch customer experiences results in high customer satisfaction. So not only will you have a high NPS score, you’ll also be able to turn those satisfied customers into your champions. A raw, positive customer referral is infinitely more powerful than any advertising copy.
Many companies are publicly private about its outsourcing practices, so go deeper than a few Google searches when carrying out your research. Conversations with peers and BPO reps will bear more fruit. Ask for examples and personal accounts so you can understand how the agents would react in any situation.
Ask a lot of questions about the training the contact agents receive.
Contact agents will be your front line so it’s important they are prepared for any scenario. Whether it’s risk, user safety or fraud prevention, proper training is critical. Last year, one of my TnS agents saved one of our major partners over $20,000 by foiling an attempted money laundering scam before it even got started. Our in-depth agent training programs were central to this big win.
Ask what training programs are available, and if they can be tailored to suit your needs. Empathy training for emergency situations and crises help equip agents with the skills needed in case they find themselves in a sensitive or stressful situation. The key to success is the people so choose an organization that invests in recruitment, training and quality.
Be clear about the security measures that you want in place.
By having the security discussion up front, you can find a partner that is flexible enough to provide what you need. Inform yourself about the company’s network security and how they intend to keep your data safe. Ask: Does their security philosophy match yours? Do they have the right tools already in place? What else is needed to keep yours and your customers’ data safe?
Ask about their data recovery and business continuity plans in the case of a breach. With data breaches looming around the corner every day, it’s imperative to know there’s a backup plan should a breach occur.
Make sure your partner can support your growth.
When companies experience rapid growth, it will throw up a lot of challenges on your journey to success, and many of them will be way outside of the sphere of your core competencies. You’ll need to hire in functional expertise, set up complex new systems and processes, and create management structures. In a world where companies grow faster than at any other time in history, most are outsourcing at least some of their core functions, so that they scale up successfully.
Take Airbnb for example, who over the past ten years has seen phenomenal growth. What started as a small company in San Francisco that allowed people to turn their spare bedrooms into vacation rentals, now operates in more than 190 countries worldwide. When Airbnb contracted Voxpro to carry out its TnS operations, it started with six agents. Three years later, the number has grown to 106 given the rapid growth of the business. A great BPO will grow with you.
It’s a scary time to do business, but in the 20 years I have been running companies, I have never experienced a more exciting time to do business. The digital nature of today’s global economy has opened up amazing opportunities to scale your company bigger and faster than at any other point in history. Yes, it also opens up opportunities for cyber criminal opportunists too, but never forget that you are the one in control, not them. By taking a proactive approach to your trust and safety operations you will shut them down, lock them out, and successfully scale the size and the trust of your customer base.
The post Here’s How #Taking #Cybersecurity Very #Seriously Enhances Your #Brand appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
Source: National Cyber Security – Produced By Gregory Evans A recent survey of 2,000 UK businesses looking at digital transformation showed the number of businesses with formal strategies had doubled over the last year to 63%. However, businesses with less than 50 employees lagged behind with 64% not having a formal plan, compared to 91% […] View full post on AmIHackerProof.com | Can You Be Hacked?
Handling raw data—whether for warehousing, analysis, or safekeeping—represents an important challenge for many banks, which financial institutions have collectively spent billions of dollars tackling. At Microsoft, we understand the power and the promise that effectively managed data holds, and we’re helping banks make better sense of customer information to uncover…
The post A common defense: taking a collaborative approach to cybersecurity appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
Cyber hacking is a global threat. Now Illinois is taking steps to make sure your information is safe. According to the Department of Innovation and Technology, 91 percent of all cyber-attacks start with an email. Typically, it’s a phishing email that looks completely normal but is actually a threat. The…
View full post on National Cyber Security Ventures