Posts Tagged ‘hacker’

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
http://blog.stcloudstate.edu/ims?s=hacker

edmodo accounts compromised

Edmodo Investigates Millions of User Accounts for Sale on Dark Web

By Sri Ravipati  05/12/17

https://thejournal.com/articles/2017/05/12/millions-of-edmodo-user-accounts-for-sale-on-dark-web.aspx

A hacker going by the name “nclay” claims to have stolen more than 77 million user accounts from Edmodo

LeakBase yesterday Tweeted that the top domains for the data breach include:

  • @gmail.com, accounting for 19 percent of the accounts at 13,286,240;
  • @hotmail.com, making up 10 percent of the accounts at 7,065,761; and
  • @yahoo.com, at 8 percent with 6,074,901 accounts.

+++++++++++++++++++++
more on Edmodo in this IMS blog
https://blog.stcloudstate.edu/ims?s=edmodo

against government hackers

How to defend against government hackers

By Mark Rockwell Mar 31, 2017

https://fcw.com/articles/2017/03/31/rule41-aclu-defense-cyber.aspx

The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.

Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure

++++++++++++++++++++++++
more on surveillance in this IMS blog
http://blog.stcloudstate.edu/ims?s=surveillance

hacking voting

A Voice Cuts Through, and Adds to, the Intrigue of Russia’s Cyberattacks

++++++++++++++++++++
more on Eastern European hackers in this IMS blog:
http://blog.stcloudstate.edu/ims/2016/06/22/ukrainian-hacker-and-fbi/

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”

The prowess of these three crackers also underscores the need for end users to come up with better password hygiene. Many Fortune 500 companies tightly control the types of passwords employees are allowed to use to access e-mail and company networks, and they go a long way to dampen crackers’ success.

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords