cybersecurity – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png cybersecurity – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[Careful With That QR Code! Five Steps For QR Code Safety]]> https://www.psafe.com/en/blog/careful-with-that-qr-code-five-steps-for-qr-code-safety/ Fri, 11 Mar 2022 18:14:35 +0000 https://www.psafe.com/en/blog/?p=21198 For 20 million people, the temptation proved too hard to resist. For a full minute, a simple QR code ping-ponged back and forth on their television screens during a break in the action at the Super Bowl. Cryptocurrency company Coinbase reportedly paid 14 million dollars for that ad – but clearly, they got their money’s worth: 20 million people were redirected via QR code to their landing page, specially designed for the ad. 

Caution Flags 

The radical simplicity and irresistible pull of the Coinbase spot was the talk of the post-game ad reviews. But out of the din of this discussion came another message — this one from the Federal Bureau of Investigation (FBI). Inc Magazine’s Jason Aten pointed to a warning they had issued a month prior to the big game – the first lines lay out the situation quite clearly:

The FBI is issuing this announcement to raise awareness of malicious Quick Response (QR) codes. Cybercriminals are tampering with QR codes to redirect victims to malicious sites that steal login and financial information.

QR Codes Are Back, And Bigger Than Ever

Once again, it seems that bad actors have seized on a popular trend to help them do their dirty work. A simple technology dating back to the 90’s, QR Codes are on the rise lately – as they’ve become a very effective digital tool for marketers who want to quickly convert mobile phone readers into shoppers and buyers. The Wikipedia entry on QR codes gives you a quick grasp of just how powerful they can be when scanned on a mobile phone:

QR codes may be used to display text to the user, to open a webpage on the user’s device, to add a Card contact to the user’s device, to open a Uniform Resource Identifier (URI), to connect to a wireless network, or to compose an email or text message.

All you have to do is think about how hackers might use that kind of power, and you can quickly see that indiscriminate scanning of QR codes could lead you into some serious trouble. 

Two Primary Sources of QR Code Danger

The first danger with malicious QR codes is the fact that they can transport you seamlessly to a fake website. As with most hacks, the first layer of the transaction seems to be legitimate: the QR code works! The user arrives at a site that has the offer or information they were seeking. 

And this is when many users will let their guard down, and fail to notice telltale signs that the site isn’t legitimate. Super-sweetened offers can also play a role in softening up otherwise careful users. The bad website can be a collection point for private information and financial data, and the path to financial losses and ID Theft is paved.

The second danger is QR codes that include malware themselves. Once again, let’s turn to the FBI for — “just the facts”:

Malicious QR codes may also contain embedded malware, allowing a criminal to gain access to the victim’s mobile device and steal the victim’s location as well as personal and financial information. The cybercriminal can leverage the stolen financial information to withdraw funds from victim accounts.

That’s about as bad as it can get. So, short of forsaking the use of all QR codes — how do you defend yourself?

What Can You Do?

Here are the five steps you can take – we discuss each below in more detail:

  1. Get informed about what QR codes are and what they can do.
  2. Make sure your device has good security software.
  3. Use that security software regularly!
  4. Before scanning any QR code, scan “the situation.” 
  5. Make sure you land where you expected to!

You’ll be glad to know that you’re well on your way to completing the first step. We hope this article has helped in this regard, and if you want to get even more up-to-date on potential threats to you and your mobile device, we highly recommend these two companion articles:

Six Ways That Cybercriminals Try To Take Over Your Device – QR codes are covered here along with several other traps, like WiFi Honeypots, Fake Apps, and even Subtitles in Streaming Apps. Do give it a careful read – lots to learn here.

Can a QR Code Be Used In A Phishing Attack? – If you’ve followed us so far, you know the answer to this question is YES! But hit the link to get more information on how QR codes can bait the hook for hackers’ big Phishing expeditions.

Security Help

If you’re using dfndr security, make sure you activate the anti-hacking feature to protect you from scams and malware. dfndr security PRO plan also has a dedicated Safe App function to help sniff out apps that contain malware, and also provides complete Identity Theft reports should you suspect trouble.

Eyes Up!

But your awareness is always going to be your first line of defense. Remember that QR codes primary benefit is to help you connect to a specific spot on the web without your having to type in a URL. The “fun” of seeing this work is no doubt a major part of the success of that Coinbase ad. 

If you decide you do want to scan a QR code – make sure you can verify it’s from a trusted source, and take a good close look at the surroundings: the copy and design, the context of use. Is the code stuck on a wall outside a club? Or did it come to you via a traceable source like a mass mailing? If you can verify that the code is from a trustworthy source – make sure the landing spot is what you expected it to be.  

Just remember what your friends in the FBI told you: a QR code isn’t a game to be taken lightly — or a Pokemon type game where you have to capture and collect. They serve a very specific function, and they’re more powerful than they look. Treat QR codes with the same caution you’d give to any unknown app or web address.

]]>
<![CDATA[Pharming: Phishing’s Nasty Big Brother]]> https://www.psafe.com/en/blog/pharming-phishings-nasty-big-brother/ Tue, 08 Mar 2022 17:31:21 +0000 https://www.psafe.com/en/blog/?p=21190 Pharming is somewhat less familiar than the term “phishing,” but both are methods employed by hackers to perpetrate fraud and gain illegal access to your private information. 

The ph prefix means that both are…well…phake.

But despite the cute names, the damage that can be wrought with either method is considerable. Identity Theft is the end game for many of these swindles, and as you may know, the long tail effects of ID theft can be personally devastating (and if you’ve never really experienced or read-about just how hard ID Theft can be for individuals, we highly recommend reading through that linked article. Not fun, but essential information).

While phishing attacks are made through phishy emails, pharming is the term applied when the hacker sets a trap in the form of a malevolent website: frequently, an impostor-site posing as a well-known and trusted company site. 

Pharming: Individual User Attacks

Phishing and pharming often go together – and the phishy email lures a single user to a malicious website, where the user enters their private information and the pharmer makes off with it, using it later to sow havoc by deploying it on the real site.  

Sometimes these sites are simply set up like traps on the web – you may have encountered one or more of these by simply misspelling the name of a popular site. The result may be a jarringly different site than what you expected. 

In truth these situations are relatively easy to avoid.  But sometimes the site you’re delivered to can be very close to what you expected, and that’s where real pharming trouble can begin.

Malware can drive pharming too – redirecting you to the substitute site without your awareness or permission. It’s important to remember that hackers are increasingly fond of using techniques of misdirection. You may inherit malware through a new app you download, but the consequences arrive later, when you first log on to your bank-site or try to pay your credit card bill, and the malware takes you to an impostor site to steal that information from you.

DNS Switching  

DNS switching takes the whole pharming idea to a more dangerous height. Whereas the malware or phishing-driven pharming operates at an individual user level, DNS Switching redirects all traffic to a given website to a pharmed-out impostor. 

The malware works within the DNS server and redirects requests to reach the authentic site to the pharming site. These more sophisticated attacks often involve more sophisticated fakery, and the pharming sites can be very convincing.

How To Protect Yourself, Down on The Pharm

As always, there are a few different layers of protection you can enlist to keep yourself from pharming — and the more of them you employ, the safer you’ll be:

Mindset: Your mindset as a user is one of the best defenses you have against hackers. Remember that hackers are fond of using social engineering – which some might refer to as “good old psychology” — to lure users into interactions with iffy emails, sketchy sites, and strange-people on well-known platforms. Keep your guard up, and if somebody, something, or some site asks you for information that your bank or health club or grocery-delivery (etc.) already should have, let that alarm bell go off loudly in your head. Then take three giant steps away from your keyboard. 

If your spider-sense has even an inkling that an email from a friend or a site isn’t the real deal: slow down and check it out. In general: try not to confer the trust you have in a person or company onto any representation made for them on the web. The web is…the web. And it should always be treated with caution.

Unprotected?: Public, unsecured wifi networks really are the devil’s playground.

The upshot is that public networks have chinks in their armour, and hackers use those chinks to “eavesdrop” on your conversations. Information they steal through this technical kind of listening can lead to direct attacks, or…down the road, a phishing or pharming attack tailored just for you. 

S matters: There’s a big difference between http:// and https:// — the difference is that “s,” which stands for secure. When you see the full https://, it means that information on both ends of the website transaction is encrypted and secure. When you don’t – that may not be the case. This is such a widely accepted standard now that the absence of that s should put you on high alert.  

Phishy?: If it looks or sounds phishy, it probably is. It might also be pharmy. Here’s an example of what we mean: in one of the biggest pharming attacks ever launched, a DNS Switching attack on more than 50 financial institutions, the affected users were presented with an error screen that asked them to switch off their anti-malware and any firewall protection they might be running. Many users simply complied, and provided access to the pharming malware to do the rest of the work. 

This obviously relates to our mindset discussion as well, but we wanted to emphasize that even very sophisticated pharming attacks will sometimes rely on users turning off systems of defense: whether it be their own mindset, or settings in place on their computer designed to protect them!

Speaking of Defense…  

Of course one of the essential bits of protective equipment is a good security software solution. dfndr Pro provides several excellent tools to help you protect not only your private information but your physical phone as well. Having that combination of protections is important. 

Pro also offers a Safe App function that enables you to screen any app you might want to try before downloading it, and that can be an excellent first line of protection from malware of all types – including those that are designed expressly to uh, ”take you down on the pharm.” 

With your mindset on high-alert, and your phone protected with a well-designed, and multi-layered security capability, you can move about confidently. Just be careful out there, and try not to get any mud on your shoes!

 

]]>
<![CDATA[New Android Malware, “Eventbot” Targets Financial Data]]> https://www.psafe.com/en/blog/android-malware/ Mon, 11 May 2020 20:09:20 +0000 https://www.psafe.com/en/blog/?p=20650 A pernicious new malware that steals Android mobile banking data has been discovered, and it’s targeting Android users throughout Europe and the United States. 

“Eventbot” leverages Android accessibility to reap private data from financial applications. It also has the ability to hijack SMS-based two-factor authentication codes, and it can even read user SMS messages. A very foreboding mix of capabilities. 

“This one is especially dangerous,” remarks Emilio Simoni, Research Director at dfndr lab, “Eventbot is a trojan that targets over 200 different financial apps.” Simoni explains that these  include banking, money transfer services, and crypto-currency wallets like Coinbase, Paypal Business, TransferWise, HSBC, CapitalOne, Santander, Revolut, and Barclays… and many more.

How EVENTBOT Does Its Damage

 First identified in March 2020, Eventbot makes its way onto phones by posing as a legitimate app: Adobe Flash, Microsoft Word, and similar.  Eventbot primarily resides on unofficial Android App stores and other unauthorized websites, it has also been delivered through bulk SMSs and Emails, typically offering special savings on popular Android apps.

When installed, Eventbot requests a robust list of permissions, including accessibility settings; “read” permission from external storage; the ability to send and receive SMS messages; run in the background; and launch after system boot.

Users who grant these permissions unwittingly enable EventBot to operates as a keylogger, which can extract notifications about other installed applications, and scan and scrape the content of open windows. It also further-leverages Android’s accessibility services to steal the lock-screen PIN — then sends all of its stolen data in an encrypted format to its command-center server. 

Simoni explains: “The ability to track SMS messages also enables this malware to pass-through SMS-based two-factor authentications, which opens the gates wide for financial attacks of the very worst kind.”

Protect Yourself

“It’s important to always rely on a security mechanism. dfndr security, for example, has a Safe App Installer feature that is designed expressly to deal with dangerous apps like this,” Simoni offers, “This feature lets you know if an app is safe before you ever install it, and its updated constantly by the PSafe security team. We scan the web constantly for updates and information to enrich our database.”

With Safe App Installer, any app you intend to install will be rated for trustworthiness. There are two levels of alert if the feature discovers an issue:

  • Security Alert: If the app is malware;
  • Privacy Alert: If the app already experienced a data breach;
  • Trusted: If The app is not malware or has never experienced a data breach. 

 “Eventbot would absolutely trigger a security alert,” Simoni notes.

The free version of dfndr security also has an anti-hacking capability that blocks scams directly on the SMS app, web browsers and messaging apps (WhatsApp and Facebook Messenger). It also offers a URL checker to check the security of any URL you enter.

Further Safety Measures for EventBot (and Similar Trojans)

One of the easiest ways to protect yourself is to make sure that you are only downloading mobile apps from authorized sources,” Simoni emphasizes. “With malwares as dangerous as Eventbot making the rounds, you have to be doubly alert and careful with any unofficial links.” As a rule, you’ll want to avoid any links sent by people unknown to you, and from bulk marketing SMSs and Emails. Finally, be careful with permissions required by various apps — if the list is extremely long or doesn’t make sense, be on guard.

Consider dfndr Pro

One of the best ways to protect your information now is to upgrade your dfndr security app (if you haven’t already) to PRO.  (This link will help you learn more, and you can use it to download PRO if you decide it’s right for you.).

 With dfndr Pro in your toolbox, the rest is a matter of staying as aware as you can to protect yourself and your family. PSafe will continue to provide updates here for new malwares that we discover that is especially noteworthy.

This one is VERY dangerous, so be careful out there!

]]>
<![CDATA[What Does the Future of Cybersecurity Look Like?]]> https://www.psafe.com/en/blog/future-cybersecurity-look-like/ Thu, 13 Jul 2017 12:30:19 +0000 https://www.psafe.com/en/blog/?p=12548 It seems like nearly every week a new cybersecurity threat rocks the world. However, as cybercriminals are becoming more sophisticated, so are the solutions to their cyber threats. The following will talk about three emerging trends that will make the online future safer for all of us.

Big Data Protections

With so much data constantly be collected and used for advertising purposes, one can’t help but wonder what might happen if this information fell into the wrong hands. To solve this problem, experts are turning to a technology called cognitive security. Security experts can use big data to predict and eliminate data threats before they arise. Think about the way advertisers use your information to send you unique advertisements — cognitive security works the same way, to predict threat risk.

Read More: These Are the Current Trends in Cybersecurity

Cardless ATMs

Major U.S. banks like Bank of America and Wells Fargo have already rolled out card-free ATMs that make it much harder for hackers to collect your personal information. By generating unique codes on your phone, hackers cannot collect your information from the metallic stripes used on ATM cards currently — a fairly common practice. Instead, users simply receive codes on their phones and hold their phones to the ATM machine when they want money dispensed. This way, there is no static ID number that hackers could learn in order to repeatedly access your banking information.

Internet of Things (IoT) Security

One of the biggest threats on the horizon today is the security of the Internet of Things. The IoT includes a network of home and wearable technologies that link to users’ smartphones. To protect the IoT from hackers, organizations will need to start extensive application security testing. This type of protection runs extensive tests to find vulnerabilities on apps that could be exploited by cybercriminals. The goal is to fix potential security breaches before they become problems.  

Cyber threats can seem like they’re everywhere. However, cyber threat protections are constantly being developed to thwart these sophisticated, new cyber threats. To keep yourself safe from new cyber threats, always stay up to date on the latest cybersecurity practices, and be sure to take advantage of DFNDR’s different security features. Further, be vigilant about new ways to bank, shop, and send information safely online.

]]>
<![CDATA[How to Mitigate Robotic Cyber Security Threats]]> https://www.psafe.com/en/blog/mitigate-robotic-cyber-security-threats/ Fri, 30 Jun 2017 19:30:23 +0000 https://www.psafe.com/en/blog/?p=12198 As robot development accelerates, they have taken on a larger role in our everyday lives: robot drones are used to carry out military commands around the world; robots have been used in manufacturing since the early 1960s; and robots are even relied upon during lengthy and complicated surgeries. Yet one of the most common ways that we interact with robots on a day-to-day basis is through our smartphones. Internet bots can now help people shop online, purchase plane tickets, order food, and even carry out malicious attacks. Protect your personal information from malicious bots online by activating Anti-Hacking:

Deeplink_Activate-Anti-Hacking
Anti-Hacking will protect you from malicious websites and bots that are designed to steal your money and personal information. Yet this is just one robotic threat, and how to protect yourself. Despite the potential for critical services to be endangered by robot hijacking and manipulation, cybersecurity is rarely prioritized during the design and production of robots. Below are some suggestions for mitigating this threat in the future.

Read More: Hackers Can Now Use Your Phone Sensors to Steal Your PIN Info

What Malware Threats Do Robots Face?

Robots are embedded systems, meaning they are a computing system constructed within a larger system. As an embedded system, these machines are vulnerable to a number of different attacks including hardware attacks, firmware or OS attacks, and application attacks. In addition, many robots rely on insecure methods of communication and lack acceptable cryptographic standards. While there has yet to be a major cyber attack against robots, researchers have successfully hacked a teleoperated surgical robot, pointing to a real possibility of robotic cyber attacks in the future.

Potential Impact of Robotic Cyber Security Attacks

Many robots operate in close proximity to people and as such, a cyber attack poses a danger to the humans directly interacting with these machines. A hijacked military drone could be rerouted to target civilian populations while an automated vehicle could be manipulated to override collision avoidance software.

In recent years, the number of manufacturing jobs held by robots has increased, hovering around 10 percent. Should a cyber attack dismantle robots in manufacturing settings, such an attack would drastically alter or potentially halt production at assembly plants.

Mitigating Robotic Cyber Security Threats

To mitigate the possibility of cyber attacks, robotic manufacturing employees should strictly limit access to sensitive material regarding robot hardware. Robot manufacturers should also consider implementing a common, standardized operating system and create a council to oversee security issues and updates to the operating system. Most importantly, robot manufacturers should turn their attention to creating a secure application code and placing emphasis on cybersecurity considerations throughout the design and development stages. While these changes likely won’t happen overnight, researchers and security experts agree that robot cybersecurity should be a priority moving forward.

]]>
<![CDATA[Changes in Cybersecurity Since the Early Days of the Web]]> https://www.psafe.com/en/blog/changes-cybersecurity-since-early-days-web/ Mon, 22 May 2017 14:00:40 +0000 https://www.psafe.com/en/blog/?p=11339 Often, computer users assume that today’s prevalence of viruses, malware, and other threats are a new development. To an extent, this is true — malware has indeed increased in frequency and strength over the years. But hackers and their malicious creations have existed almost since the dawn of the World Wide Web. Indeed, the first online worm was hatched in 1989! As the Internet grew and developed, so did the amount of risks to online users, and cybersecurity was forced to keep pace.

These days, handling the aftermath of a security breach is as important as preventing one. Of course, there are many firewalls, virus detectors, and scanners you can use to ease your mind and stay protected against future malware. However, in 2017, online crime’s sophistication level is so high that these attacks can’t always be predicted. Read on to discover a short history of online threats — and how cybersecurity efforts have battled them!

Read More: These Are the Current Trends in Cybersecurity

1989: The First Worm is Born

Robert Morris designed the world’s first online worm in 1989. His denial-of-service attack (DoS) was so ruthless that it managed to compromise a lot of the web. This initial virus helped create the infrastructure for a first round of cybersecurity. Computer Emergency Response Teams (CERTs) were founded to immediately combat any malicious threats as they appeared. During this time, the earliest virus scans and firewalls started to be developed, too.

1990s: The Earliest Viruses

Remember the viruses called ILOVEYOU and Melissa? By attacking email accounts, this wicked duo infected millions of computers worldwide. In the 1990s, users weren’t as aware of spam attachments and links. So, everyone was more vulnerable to these attacks, since phishing attempts were far more likely to succeed. People were just clicking on whatever landed in their inbox, whether from a friend or an unknown address. In the aftermath of Melissa and ILOVEYOU, improved cybersecurity technology was built to identify viruses before they began wreaking havoc.

2000s: Online Identity Theft

After the new millennium, an onslaught of online identity thefts occurred. Hackers were targeting credit cards, specifically. The effects were devastating, since millions of dollars had to be returned to the affected victims. Since these breaches were largely occurring at American retailers like TJ Maxx and Target, companies had to invest in improved cybersecurity to protect their customers’ transactions. Point-of-sales (POS) are now heavily safeguarded to avoid losing millions of dollars — along with their customers’ hard-earned trust.

]]>
<![CDATA[What You Need to Know About Emerging Cybersecurity Trends]]> https://www.psafe.com/en/blog/need-know-emerging-cybersecurity-trends/ Fri, 21 Apr 2017 14:00:30 +0000 https://www.psafe.com/en/blog/?p=10141 From phishing to DDoS attacks, companies, political figures, and celebrities have all experienced their share. For the average American, though, the threat of a cybersecurity breach doesn’t feel like such a big deal — but it is. So, what can you do? You can start by running regular virus scans on your phone to check for malware that could lead to your data being stolen:

run-security-scan
The Full Virus Scan will check your device and SD card for the latest security threats. That way, your private information will never be compromised — as long as you catch any threats in time. This highly-rated antivirus protection will help protect you from whatever is lurking online. To run a virus scan, click the button above or else open the DFNDR app. Head to “Tools,” then click on “Full Anti-Virus.” If any malware is found, select the option to “fix the selected items.”

Read More: Does the U.S. Government Value Your Privacy?

Criminal Masterminds

At one time, hackers were a mostly solitary bunch. They would steal this info or that and move on to the next victim. Now, however, hackers work together. They use each other’s strengths to attack large organizations, financial institutions, and corporations. What if they target your bank, a place you shop, or some other outlet?

Now that your Internet history is available for sale from your Internet service provider — so they can make money from you without your consent — it becomes another way a hacker can gain personal information. Both of these points mean that you can no longer ignore securing your information or devices to prevent attacks from hackers.

Popular Apps

End-to-end encryption in apps like WhatsApp keep your data safe. It means that your messages are sent to the recipient without anyone else having access. That’s a great thing for everyone who has ever shared a personal bit of info, like a login username and password. But some groups and governments want a back door built in to allow themselves access to your message. Hackers could take advantage of this weakness. Providing a back door gives hackers a way to break in and gobble up whatever information they can get.

Cell Phone Users

You use your cell phone to do everything, from finding directions to the nearest Thai restaurant, to paying for your electric bill, to shopping online for just about everything. Hackers know this, too. The information they steal is more than your name. They can nab your address; they can know where you are located and decide if they want to target your home. They can also grab your logins and passwords, your financial info like your credit card numbers, and even your social security number.

]]>
<![CDATA[New York’s Cybersecurity Regulations Are a Model for States]]> https://www.psafe.com/en/blog/new-yorks-cybersecurity-regulations-model-states/ Sat, 08 Apr 2017 14:00:06 +0000 https://www.psafe.com/en/blog/?p=9755 New York Governor, Andrew Cuomo, sent out his proposal for cybersecurity regulations for banks and insurers. The steps outlined in the proposal make it clear that cybersecurity, and those many breaches in privacy and personal data, are finally viewed as a real danger. The regulations started to take place in March of this year.

While New York is on the right track, they still have a long way to go to truly improve cybersecurity efforts. Fortunately, you don’t have to wait — you can improve your cyber awareness through a few simple steps. You should create strong and complex passwords, be wary of unknown links or emails, and regularly scan your devices for viruses. Use the Full Virus Scan to check your smartphone and SD card for malware and security threats. Click here to scan your device for malware now:

run-security-scan
Read More: How Effective is Your Android Security App?

New York’s Cybersecurity Regulations

Why the big deal? Haven’t banks and insurance institutions always had security and cyber-related standards and regulations? Yes, except this is the first time that anyone has proposed a list of specific requirements in that realm. It’s a huge step forward.

After all, privacy is a big concern. Whether you are shopping or browsing online, your personal data is important. Identity theft, data breaches, and other cybercrimes aren’t just going to go away. This regulation makes it clear that companies need to do more. It will likely have far-reaching effects. Other states and even other countries will likely model their policies after the New York model.

There are fourteen pages in the document, and it is broken into twenty-three different sections. But is it enough? Those who have experience in cybersecurity believe it is a start but it isn’t quite enough. While it is great that companies will need to take a firm, active stance in the matter — and undergo processes to thwart this type of crime — some point out that the proposal doesn’t go far enough.

They highlight the fact that cyber risk certifications will be checked once per year or even quarterly. Based on the number of updates antivirus software typically undergoes, an annual check certainly won’t be enough. A quarterly check isn’t looking any better, either.

How to Improve the Proposal

Technology advances: it’s constantly changing. These systems won’t stay static; they need to be frequently checked. Technology’s evolution demands that information systems be checked for errors that account for many of the largest breaches, as opposed to solely issues with firewalls.

]]>
<![CDATA[Should Kids Learn About Cybersecurity in School?]]> https://www.psafe.com/en/blog/kids-learn-cybersecurity-school/ Wed, 09 Nov 2016 21:00:05 +0000 https://www.psafe.com/en/blog/?p=5602 Computer education has become an important part of curriculums all across the nation. Kids from grades K-12 are learning how to type and properly use modern day computers. However, it is debatable how much we should teach kids about computers. One topic related to computers is cybersecurity. Here are a few pros and cons of teaching children about cybersecurity in school.

Pros

Cybercrime has been exploding throughout the past few years at an alarming rate. As computers get more secure, hackers get more knowledgeable about cracking codes to infiltrate these systems. Thus, knowing about cybersecurity can be an extremely useful skill in the job market. Considering the student debt accumulation in the United States, paving the way for children to take advantage of cybersecurity programs at a trade school or community college could be a smart investment.

Read More: Mobile Malware is on the Rise — Find out Why

Moreover, cybersecurity isn’t just for those looking to go into the computer industry. Cybercrime is rampant across America, so individuals need to have a basic foundation of cybersecurity knowledge if they wish to operate their computers and other devices efficiently. For instance, knowing how to spot phishing or a malicious email is imperative to staying safe online. These hackers can lead to large losses of money and data on your computer.

Beyond computer security, it is important to teach kids about passwords. For example, repeating your password for all of your accounts is extremely dangerous if a hacker can get their hands on the password. Plus, password complexity is another layer of protection. These are all cybersecurity issues that are important for kids to know

Cons

While cybercrime is becoming increasingly more problematic, some find learning about cybersecurity to be an inefficient way to utilize school time. Some kids won’t go on to primarily use computers in their jobs, so this could be a huge waste of time for them when they could be learning more valuable and substantive material.

Plus, this could be a tax burden for public schooling systems. Funding expensive laptops and other devices could be a questionable investment for schools that are lacking in other important materials such as textbooks.

In sum, there are several pros and cons to teaching kids about cybersecurity in school. The subject matter certainly depends upon the environment of the school and the interests of the children being taught.

]]>
<![CDATA[What Does the Government Spend on Cybersecurity?]]> https://www.psafe.com/en/blog/government-spend-cybersecurity/ Fri, 04 Nov 2016 13:34:37 +0000 https://www.psafe.com/en/blog/?p=5436 Our computers need to be protected just like our domestic soil. There are thousands of top secret documents that are targeted by hackers and other computer criminals. As a result, cybersecurity has become a popular policy issue within the past few years. Here is how our government deals with cyber crime.

The primary funding mentioned below is encompassed within the Cybersecurity National Action Plan. This is the culmination of 7 years of research done by the administration, and it will address cybersecurity threats and intrusions. The plan will help the government promote internet and computer security to businesses both private and public. Here are some of its highlights.

Read More: Are Voting Machines Susceptible to Hacking?

There are a few different avenues through which our government can funnel money in order to address problems with cybersecurity. For instance, according to whitehouse.gov, the President plans to allocate $3.1 billion dollars in the 2017 fiscal budget towards Technological Modernization Funding. This ensures that governmental computer technology is up to date and functioning. This funding also helps support maximum computer security on this equipment.

The United States government is also investing in cybersecurity education for federal programs throughout the nation. The President plans to invest $62 million in this education. Among this funding will be scholarship programs for citizens who are wishing to break into the field of cybersecurity for the federal government.

Moreover, this funding will implement a Cybersecurity Core Curriculum that will ensure that cybersecurity graduates have what it takes to work for the federal government. The president’s budget is also incentivizing individuals to join the cybersecurity workforce by granting student loan forgiveness for those who are wishing to go into this field in the federal workforce.

PSafe Total
Who needs federal tax dollars when you can download PSafe Total and PSafe Total Windows for free? PSafe Total includes a variety of tools that will help optimize your device’s performance and secure you from malicious hackers. PSafe Total includes features such as Advanced Protection, which allows PSafe to protect your device from third-party uninstalls in case of loss or theft. This maximizes the privacy of your photos, messages, and personal data.

Plus, the anti-theft software allows PSafe Total to track, block, locate, and even erase all of your data remotely in case of theft.

]]>