Young Adults, Seniors Over 75 Most Susceptible to Cyber Fraud: Report

source: technewsworld.com

The most vulnerable cybercrime victims are young adults and adults over 75, according to the latest research revealed in the LexisNexis Risk Solutions biannual Cybercrime Report.

Released Feb. 23, the report tracks global cybercrime activity from July 2020 through December 2020. The report reveals how unprecedented global change in 2020 created new opportunities for cybercriminals around the world, particularly as they targeted new users of online channels.

LexisNexis’ research found a 29 percent growth in global transaction volume compared to the second half of 2019. This growth came in the financial services (29 percent), e-commerce (38 percent) and media (9 percent) sectors. The number of human-initiated attacks dropped in 2020 by roughly 184 million, while the number of bot attacks grew by 100 million.

Continue reading “Young Adults, Seniors Over 75 Most Susceptible to Cyber Fraud: Report”

LastPass vs. 1Password: Two top password managers, compared

source: cnet.com


It wasn’t long ago that I raised an editorial toast to the reigning champion of password managers, LastPass, recommending it not only for its broad suite of premium features but — most crucially — for its refusal to let down its veteran fanbase of free users, even as it faced sweeping scrutiny over an ownership change. 

The move tragically undermines a key security principle that’s made LastPass’s free version so effective at core security — its seamless multiplatform integration. Using a password manager to boost security, perhaps more so than many other privacy products, pivots on a fulcrum of maximum user convenience. If not immediately and consistently visible during all browsing, a password manager can quickly be forgotten, and your ever-increasing number of passwords become more readily stored in a browser itself (a much less secure option). 

With more types of internet-connected devices in users’ hands — and with a digital divide contributing to a broader shift toward accessing the internet via phone — internet use is becoming more fluid. So a free password manager that can’t adroitly pivot between a user’s devices just isn’t going to cut it. 

Read the full article here

 

The best Windows 10 antivirus protection for 2021

source: cnet.com

Your Windows PC needs protection against malware, and free antivirus software may be enough. Here’s the best antivirus protection for Windows 10, and what’s worth paying extra for.

An online security quiver needs plenty of arrows — a VPN to protect your internet traffic, a password manager to keep track of login credentials and an end-to-end encrypted messaging app to stop others from spying on your communications. But if you’re running Windows, that list should also include antivirus tools such as malware protection and antivirus software that monitors downloads and observes your system’s activity for suspicious behavior and malicious software.

If you’re looking for the best malware protection and antivirus software, here’s the first thing you need to know: Microsoft Defender Antivirus — the free internet security software and virus protection program that comes with Windows 10 and until recently was called Windows Defender — does a decent job of protecting your PC and offering internet security. (Amazingly, Microsoft provided no built-in protection for Windows back in the days of Windows 98 and XP.) Using Microsoft Defender for threat detection should be your starting point for the best antivirus security on Windows, and most people will find they don’t need to go any further when it comes to nailing down an antivirus solution.

However, keeping your personal data safe and guarding your privacy extends beyond virus protection, and that’s where third-party antivirus software shines. A full protection package can monitor your Windows computer as well as MacOS, iOS and Android devices and include a password manager, a VPN, parental control, secure online backup, identity theft protection, protection against phishing and malicious websites and more — all worthwhile tools that can guard your privacy and keep your data secure.

Continue reading “The best Windows 10 antivirus protection for 2021”

Strong Passwords Aren’t As Easy As Adding 123. Here’s What Experts Say Really Helps


source:  cnet.com

Creating a good password isn’t as simple as putting an exclamation mark at the end.

You’ve seen all the familiar rules for strong passwords almost every time you create an online account. Use capital letters, numbers and special characters, and make it at least 8 characters long (or 10, or 12). These requirements are designed to make it harder for hackers to get into your accounts. However, they don’t really make your password stronger, say researchers at Carnegie Mellon University.

Lorrie Cranor, director of the CyLab Usable Security and Privacy Laboratory at CMU, says her team has a better way, a meter that websites can use to prompt you to create more-secure passwords. After you’ve created a password of at least 10 characters, the meter will start giving suggestions, such as breaking up common words with slashes or random letters, to make your password stronger. 

These tips set the password strength meter apart from other meters that provide an estimated password strength, often using colors. The suggestions don’t come from a checklist, but instead respond to common pitfalls Cranor’s team has seen people make when they set up passwords during experiments run by the lab over several years.

One of the problems with many passwords is that they tick all the security checks but are still easy to guess because most of us follow the same patterns, the lab found. Are numbers required? You’ll likely add a “1” at the end. Is it capital letters? You’ll probably make it the first one in the password. And special characters? Frequently exclamation marks.

CMU’s password meter will offer advice for strengthening a password like “ILoveYou2!” — which meets the standard requirements. The meter also offers other advice based on what you type in, such as reminding you not to use a name or suggesting you put special characters in the middle of your password. 

“It’s relevant to what you’re doing, rather than some random tip,” Cranor said. 

Continue reading “Strong Passwords Aren’t As Easy As Adding 123. Here’s What Experts Say Really Helps”

8 Ways to Get More Done in Microsoft Word With Less Work

source: fastcompany.com

 

Love it or hate it, at 37 years and counting, Microsoft Word is old enough to run for president or have gotten divorced (maybe a couple times). It might even experience unexplainable back pain in the morning.

Word not going anywhere—at least not for a while. And even if you use it every day, there are still probably plenty of super-helpful tips, tricks, and shortcuts you haven’t discovered. Here’s a quick list of some of the more useful ones.

Note: I’m using Microsoft Word for Office 365 on a Windows 10 PC but I’ll list Mac equivalents where available.

AUTO-GENERATE SOME GIBBERISH

If you’re the type of person who likes to get something—anything—on the page just so you don’t have to stare unblinkingly into all that white space, you may be happy to know that Word puts a couple forms of dummy text close at hand.

Should you be a fan of the classic Lorem ipsum prose, simply type =lorem(4,3) and hit Enter to get four paragraphs of Lorem ipsum at a length of three sentences each. Replace the digits in the parentheses to get however many paragraphs and sentences you need, respectively.

If you’re not a fan of Lorem ipsum, then replace lorem with rand instead—for example: =rand(4,3)—to get what appears to be documentation lifted from Word’s help file.

Quickbooks Logo

Quickbooks Logo

Quickbooks Logo

 

At quick glance, ‘expertly framed’ Quickbooks phishing email looks legit

source: scmagazine.com

Attackers impersonating Quickbooks on the Microsoft 365 platform create a sense of urgency to compel their victims to “promptly” pay fake invoices allegedly from a legitimate vendor, thereby opening them up to a future malicious act.

Such phishing attacks are growing increasingly common, according to blog post from researchers at Abnormal Security who have observed 900 “attacks in the mailboxes of over 20 different customers,” with the expectation that the rate will continue to tick upward as users flock to Quickbooks online services.

These latest attacks use spoofing to bypass traditional mail filters and gain legitimacy, sending emails that seem to originate from quickbooks@notification.intuit.com. The bad actors then prompt recipients to click on “Review and Pay,” which redirects them to http://parkburgerkuwait.com/loss[dot]php.

The attack is effective in part because the email is received on the same day the invoice is due, prompting the recipient to possibly act in haste without close scrutiny of the details. Among the red flags that may go overlooked: The suspicious landing page link or the headers that “reveal that the true sender domain is ‘airtelbroadband.in,’ which fails authentication,” said Abnormal researchers.

The bad actors have put considerable effort into creating a convincing email that Abnormal said, “is expertly framed,” using Inuit Quickbooks logos and links.

“Additionally, the email states at the bottom to check with the business owner before paying to avoid fraud, giving the recipient a false sense of security as it seems counterintuitive for an attacker to warn their target about their potentially malicious email,” the researchers said.

Don’t give your information to marketers who might pelt you with spam or even expose you to a potential hack. Use Abine Blur instead.

source: fastcompany.com

Over the summer, I came across an online store that was promising big discounts on All-Clad cookware, but with a catch: You had to hand over an email address just to see what the deals were.

This would have given me pause if not for a secret weapon: I loaded up a service called Abine Blur and generated a free “masked email” address to use instead of my real one. While the masked email would still forward messages to my actual Gmail inbox, the store would never learn my real address, and I could cut off any future emails with one click.

I started using Abine Blur about five months ago, after hearing about it from one of my newsletter readers, and it’s since become one of my most cherished privacy services. With masked email addresses, I don’t have to worry about getting spammed just because I signed up for an app, made a donation, or subscribed to some retailer’s newsletter in exchange for a coupon. I just tell Abine Blur to stop forwarding their emails, and our link is severed.

Continue reading “This Free Service Is a Genius Way to Foil Spam…”

Find out if you can meet all your needs within a 15-minute walk from your house.

source:  fastcompany.com

In a “15-minute city,” it’s possible to meet your basic needs within a 15-minute walk or bike ride. Instead of sitting in traffic during a rush-hour commute, you can work at home or walk to an office nearby. You can walk to get groceries, go to the doctor, take your kids to school, or run any other everyday errand. Housing is affordable, so a barista could live in a walkable neighborhood as easily as a lawyer. It’s a concept championed by the mayor of Paris and, more recently, pitched by a global network of cities as a tool for helping urban areas recover from the pandemic—and improve sustainability and health as people start to get more exercise while conducting their day-to-day activities.

In the U.S., car-dependent sprawl is more common. But a new tool lets you map out local services to see how close your neighborhood comes to the ideal.

 

Click here to try out the tool:

https://app.developer.here.com/15-min-city-map/

“The global pandemic has highlighted the importance of location and proximity,” says Jordan Stark, a spokesperson for Here Technologies, the location data platform that created the map. The company typically creates maps for businesses, such as delivery companies that need to route vehicles, and built the new tool to demonstrate how developers could work with its data. While the current version maps out amenities like grocery stores, transit stops, and medical care—along the lines of Walkscore, another tool—the company says it might later create an iteration that considers how far residents might have to travel to get to an office.

The map also shows how many services can be accessed by car from an address. “We wanted to show, especially in the U.S., the contrast in the accessibility between walking and driving,” Stark says. “And as you can imagine, there are a number of communities where you have all of your essential items within a 15-minute drive, but potentially less than one essential location in a walk. So it was a way to show that contrast in spatial makeup.”

While pockets of American cities are walkable now—the map tells me that my own neighborhood in Oakland qualifies as a “15-minute city”—it’s possible that more neighborhoods will move in this direction as cities begin to use it as a framework for urban planning. Seattle’s Office of Planning and Community Development is one of the latest to say that it is exploring the concept of 15-minute neighborhoods.

“We wanted to show, especially in the U.S., the contrast in the accessibility between walking and driving,”

source: wired.com

Wanna see me cut and paste a large block of text without formatting? Wanna see me do it again?

IT MAY NOT seem like a second or two would make a big difference in your workday. But seconds add up to minutes, and the momentum of being able to strike a few keys and keep typing makes an impact that’s difficult to quantify. That’s why I try to avoid using my mouse whenever possible: the more I can do without taking my hands off the keyboard, the quicker I can keep plugging away on the important stuff.

The Keyboard Shortcuts You Should Know

Let’s start with the basics: learn as many keyboard shortcuts as your brain can store. You probably know a few (Ctrl+C to copy and Ctrl+V to paste, for example), but there are dozens of others that can replace the clicks you make all day long. Here are a few I can’t live without:

8 Tips to Tighten Up Your Work From Home Network

source: https://nakedsecurity.sophos.com/

If you connect it, protect it.”

Every time you hook up a poorly-protected device to your network, you run the risk that crooks will find it, probe it, attack it, exploit it and – if things end badly – use it as a toehold to dig into your digital life.

Criminals who figure out how to commandeer a vulnerable device inside your network can use that device to map out, scan and attack your laptop – the one you’re using right now to work from home – as if they were right there beside you.

In addition, certain elements will be centered on mobile devices and tablets and aligned to the left or right on a desktop display. You can adjust the layout for each Block at three different device widths – desktop, tablet, and mobile.

work from home

“A blockquote highlights important information, which may or may not be an actual quote. It uses distinct styling to set it apart from other content on the page.”

You will find in any penetration tester’s toolbox.

Continue reading “8 Tips to Tighten Up Your Work‑From‑Home Network”