now browsing by tag


Alex Williamson Finally Responds To Backlash With Very Iffy Statement | #tinder | #pof | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

To sign up for our daily newsletter filled with the latest news, goss and other stuff you should care about, head HERE. For a running feed of all our stories, […]

The post Alex Williamson Finally Responds To Backlash With Very Iffy Statement | #tinder | #pof | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

‘It’s very hard to get out.’ UH linebacker using his platform to help the fight against sex trafficking | #tinder | #pof | #match | #sextrafficking | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

HOUSTON – With every bench press rep, Grant Stuard is making a difference. Stuard, a University of Houston linebacker and first-team All-American Athletic Conference selection, participated in Friday’s Pro Day […]

The post ‘It’s very hard to get out.’ UH linebacker using his platform to help the fight against sex trafficking | #tinder | #pof | #match | #sextrafficking | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

#parent | #kids | Police warn of ‘very dangerous’ app which ‘poses risk to children’ | #parenting | #parenting | #kids

West Midlands Police issued an urgent warning to parents over a “very dangerous” live streaming app it posed a “risk to children”.

West Midlands Police urged families to be aware of the YOME LIVE streaming app amid fears predators may be bribing children with gifts in exchange for private chats.

Parents were urged to not tell their children about the app in case they downloaded it out of curiosity.

In a message on West Midlands Police’s online alert system, WMNow, Nicola Tinker said: “YOME LIVE (pronounced YO-ME) is a very dangerous live streaming app which poses a risk to children and young people.

Video Loading

Video Unavailable

“Do not disclose this app to children as their curiosity could well send them to look at it. YOME is a publicly live stream video or voice chat which creates an easy to access video and chat environment frequented by adults in a highly sexualised behaviour.

“They target young people who often get sent gifts to persuade them to “FOLLOW” chat privately with adults. HELP KEEP OUR CHILDREN SAFE!”

BirminghamLive has asked YOME for a statement.

*To keep up-to-date with crime in your community, join the  Black Country Crime Watch Facebook group where you will be alerted to any suspicious or criminal behaviour happening in your area.

Online safety for children

Below is advice from the West Midlands Police website on online safety for children:

Has something happened online that has made you feel worried or unsafe?  Are you worried about the safety of your children when they are online?

The CEOP (Child Exploitation and Online Protection) website allows you to report concerns online and to discover how young people can stay safe online from issues such as online abuse or sexual exploitation.

You can also find further online safety advice from  Thinkuknow or the  NSPCC if you are worried about online safety, people acting inappropriately online, or if you fear you or your child is being sexually abused or groomed.

Source link

Source link

View full post on National Cyber Security

#cybersecurity | #hackerspace | We Phish You a Very Merry Christmas and a Fraudulent New Year

Source: National Cyber Security – Produced By Gregory Evans The holiday season is kicking into full gear, and so is the annual holiday cybercrime surge. As gift givers scour the web to seek out the best deals, cybercrooks put in extra work to profit off of the holiday shopping frenzy. Cybersecurity researchers report that this […] View full post on

#cybersecurity | #hackerspace | Just 12% of ICS Security Pros Very Sure of Orgs’ Ability to Respond to Digital Attacks

Source: National Cyber Security – Produced By Gregory Evans

Malicious actors are increasingly launching digital attacks against industrial organizations. Many of these campaigns have been successful, particularly those that have targeted energy utilities and manufacturing plants. In late spring 2019, for instance, aircraft parts manufacturer ASCO temporarily suspended operations worldwide after falling victim to a ransomware attack. It was about a month later when […]… Read More

The post Just 12% of ICS Security Pros Very Sure of Orgs’ Ability to Respond to Digital Attacks appeared first on The State of Security.

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at:

Source link

The post #cybersecurity | #hackerspace |<p> Just 12% of ICS Security Pros Very Sure of Orgs’ Ability to Respond to Digital Attacks <p> appeared first on National Cyber Security.

View full post on National Cyber Security


Water locks and pumping stations in the Netherlands are in danger of being hacked due to inadequate computer hardware and software, according to an investigation published by the Telegraaf. Security software is updated just about every five years, a sign of poor maintenance, and the computer systems that control the water operations date back as far as the mid-1980s, the newspaper said.

“Locks and pumping stations can always be operated manually. You can never be totally safe, you never know what might happen,” a spokesperson for the association of local water boards told the paper. Security is a top priority, but manual operation is always available in case the automated systems are hacked, the spokesperson added.

Business association Evofenedex called noted the urgency of maintaining critical infrastructure for the transportation of goods. “The hacking of a sea container terminal earlier this year at the Port of Rotterdam shows that importance. That hack cost Dutch businesses tens of millions of euros from delays and product damages,” an Evofenedex spokesman said.

Software and hardware updates are a key method of thwarting hackers searching for known vulnerabilities. By hacking a water lock or a pump, a hacker could control the gates that determine if water is blocked or released.

The newspaper also raised issue with the poor choice of passwords used to access remote operations of sewage pumps and locks.

View full post on National Cyber Security Ventures

Here’s How #Taking #Cybersecurity Very #Seriously Enhances Your #Brand

Source: National Cyber Security – Produced By Gregory Evans

It is a scary time to do business. Phishing, hacking, identity theft, ransomware, payment fraud: the list of ways that cyber criminals are attacking individuals, companies and governments seems endless. The U.S. Securities and Exchange Commission (SEC) recently referred to cyber threats as “the greatest threat to our markets right now” and for good reason. While recent global attacks like Wannacry and Petya/GoldenEye dominated headlines due to the sheer size of its reach and impact, thousands more acts of cybercrime are committed every single day — almost 50 percent of which target businesses.

But, don’t be fooled into thinking that you have to be a Fortune 500 corporation to be a target. Cybercrime is an equal opportunity menace. Larger mature companies are hit most often, but smaller scale-ups are hit the hardest, and it takes longer for them to recover. Only 14 percent of small businesses rate their ability to mitigate cyber risks, vulnerabilities and attacks as highly effective. In today’s digital economy, winning and maintaining the trust of your customers is central to business growth, and nothing erodes trust quite like a cyber breach.

Scaling customer trust is a very different animal to scaling customer numbers. In fact, it can work in inverse proportion. When there is rapid customer base growth, it puts more strain on the company’s Trust and Safety resources, which in turn, results in an increase in security breaches and a decrease in customer trust. Don’t allow this to happen. Safely and successfully scale the trust of your customers by adopting these three key measures:

1. Take full control of updating your company’s software.

Imagine that your company is a castle. The walls of the castle can break and crumble in places, allowing intruders easy access. So these walls need to be constantly maintained and patched up. If you give everyone working in the castle responsibility for this maintenance, something is going to go wrong somewhere, sometime. One of your team will fill a hole with sand instead of cement, so you need to take full control of it.

It’s the same in a company. A recent survey conducted by research firm Voke Media found that 27 percent of companies reported a failed audit in the prior 18 months. Eighty one percent of those failures could have been prevented with a patch or configuration change. Twenty six percent of companies reported a breach, of which 79 percent could have been prevented with those two measures. In fact, if more individuals and companies kept their software up to date, the devastation caused by the recent Petya attacks would have been minimal.

By using an enterprise network, this critical function will be managed centrally by one expert rather than by many novices. 

2. Put human error in the firing line.

Even though the walls of your castle may be fully maintained and secure, a worker may unwittingly open a window or door, giving intruders full access.

Ninety five percent of all security incidents involve human error, according to the 2017 IBM Cyber Security Intelligence Index. Examples include staff clicking links to phishing scams or visiting corruptive websites, and network administrators making small errors with big consequences. For example, it was reported recently that North Korean hackers stole U.S.-South Korea war plans. A contractor working at the data center left a cable in place that connected the military intranet (which had compromised antivirus software installed) to the internet, allowing the North Korean hackers to access sensitive information.

Employees can be helped to recognize scams through prevention training and awareness programs. Make it easy for your employees to report fraudulent emails quickly, and keep testing internally to prove the training is working. Your front line must always be cyber-ready.

3. A.B.C. — Always Be Communicating with your customers.

Tell them what you are doing to keep them safe. Customers value transparency, and the more companies are open with both its customers and employees, the further trust will be established. Take Zappos, for example, who promotes transparency in its Zappos Family Core Values by being completely open with its vendors when it comes to internal information. Instead of trying to hide secrets or use private information to establish leverage, Zappos believes in giving vendors complete visibility. The result is more trusting relationships that strengthen the organization at very foundational levels.

The expertise and time required to successfully introduce all or any of these security measures can be immense, and often difficult to provide in-house. As a result, many fast-growing companies are outsourcing Trust and Safety (TnS) Operations to a partner company, allowing them to focus on core competencies. If this is a route you choose to take, be sure to demand the same level of trustworthiness from them, as your customers do from you. And here’s how to do it:

Find a partner who has a proven track record of delivering top quality TnS services.
A premium BPO will routinely outperform its partner’s Net Promoter Scores (NPS) scores and will have the data to prove it. Providing value added, high touch customer experiences results in high customer satisfaction. So not only will you have a high NPS score, you’ll also be able to turn those satisfied customers into your champions. A raw, positive customer referral is infinitely more powerful than any advertising copy.

Many companies are publicly private about its outsourcing practices, so go deeper than a few Google searches when carrying out your research. Conversations with peers and BPO reps will bear more fruit. Ask for examples and personal accounts so you can understand how the agents would react in any situation.

Ask a lot of questions about the training the contact agents receive.

Contact agents will be your front line so it’s important they are prepared for any scenario. Whether it’s risk, user safety or fraud prevention, proper training is critical. Last year, one of my TnS agents saved one of our major partners over $20,000 by foiling an attempted money laundering scam before it even got started. Our in-depth agent training programs were central to this big win.

Ask what training programs are available, and if they can be tailored to suit your needs. Empathy training for emergency situations and crises help equip agents with the skills needed in case they find themselves in a sensitive or stressful situation. The key to success is the people so choose an organization that invests in recruitment, training and quality.

Be clear about the security measures that you want in place.

By having the security discussion up front, you can find a partner that is flexible enough to provide what you need. Inform yourself about the company’s network security and how they intend to keep your data safe. Ask: Does their security philosophy match yours? Do they have the right tools already in place? What else is needed to keep yours and your customers’ data safe?

Ask about their data recovery and business continuity plans in the case of a breach. With data breaches looming around the corner every day, it’s imperative to know there’s a backup plan should a breach occur.

Make sure your partner can support your growth.

When companies experience rapid growth, it will throw up a lot of challenges on your journey to success, and many of them will be way outside of the sphere of your core competencies. You’ll need to hire in functional expertise, set up complex new systems and processes, and create management structures. In a world where companies grow faster than at any other time in history, most are outsourcing at least some of their core functions, so that they scale up successfully.

Take Airbnb for example, who over the past ten years has seen phenomenal growth. What started as a small company in San Francisco that allowed people to turn their spare bedrooms into vacation rentals, now operates in more than 190 countries worldwide. When Airbnb contracted Voxpro to carry out its TnS operations, it started with six agents. Three years later, the number has grown to 106 given the rapid growth of the business. A great BPO will grow with you.

It’s a scary time to do business, but in the 20 years I have been running companies, I have never experienced a more exciting time to do business. The digital nature of today’s global economy has opened up amazing opportunities to scale your company bigger and faster than at any other point in history. Yes, it also opens up opportunities for cyber criminal opportunists too, but never forget that you are the one in control, not them. By taking a proactive approach to your trust and safety operations you will shut them down, lock them out, and successfully scale the size and the trust of your customer base.


The post Here’s How #Taking #Cybersecurity Very #Seriously Enhances Your #Brand appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Two teenagers are under arrest following a very disturbing video out of Modesto.

The video posted on Facebook has gone viral and shows kids bullying another kid along a sidewalk. A seemingly helpless student wearing a backpack was brutally tossed to the pavement and also endured a flurry of swear words in the video.

As close to a dozen other students stood by, with some recording on cell phones, they watched as two bullies had their way. One threatened the boy and demanded the boy drop to his knees.

In the less than two minute video, the crowd breaks up and the boy is allowed to walk away.

So why did all the other kids simply watch and laugh and not doing anything to help the kid being bullied?

Read More

The post Two teenagers are under arrest following a very disturbing video out of Modesto. appeared first on Parent Security Online.

View full post on Parent Security Online

Anna Faris feels ‘very insecure’ after cheating rumours

Anna Faris felt “very insecure” after rumours circulated about Chris Pratt’s alleged infidelity. The 40-year-old actress – who married the ‘Jurassic World’ actor in 2009 – has admitted she felt “so hurt” by the claims her partner of seven years was cheating on her, and the blonde beauty has revealed she never wanted to be a woman who was “bothered” by marital trouble, although it has plagued her ever since. Speaking to PEOPLE about how she has coped with the allegations and having her relationship in the limelight, she said: Read More….

The post Anna Faris feels ‘very insecure’ after cheating rumours appeared first on Dating Scams 101.

View full post on Dating Scams 101

17 Very Real Struggles Breastfeeding Moms Totally Understand

It’s National Breastfeeding Month, a time dedicated to encouraging the breastfeeding community and building a “landscape of breastfeeding support.” Nursing moms know it’s the small victories and daily struggles that deserve applause and solidarity. So, we asked moms on Twitter to share their #breastfeedingstruggles, and the tweets below certainly prove the struggle is real. Happy nursing!