CONTENT MARKETING SPECIALIST

Just a heads up before this week’s 10 most important internet security articles: my colleague Andra wrote a huge security guide on how to master your app permissions so you don’t get hacked.

And by “huge” I really mean huge, I think it has more than 4.000 words. However, it’s really easy to follow, it’s filled with screenshots and step-by-step tutorials on how to set and tweak your app permissions in order to enhance your privacy and security. It includes permissions for your operating system, browser, accounts on social networks and smartphone.

Read it, apply it, keep it at hand in case you ever need it again.

We also updated three older articles – we added new information, facts from the most recent years and upgraded the charts and visuals:

1. 10 surprising cyber security facts that may affect your online safety – this one’s an infographic that we initially published one year ago and now we brought it up to date.

2. The essential guide to secure your Instagram account – we brought this one up to date, with fresh visuals and information on how to secure your Instagram account. We re-published it one day before their rebranding, so the colorway might be different but the steps remain the same.

3. Cyber criminals are having a “field day” with software vulnerabilities – We’ve been warning about software vulnerabilities for a very long time. Here’s an article written by our CEO, Morten Kjaersgaard, on this matter.

And now for the cyber security media articles of the week:



Security articles of the week


1. Microsoft and Adobe released critical security updates

It was Patch Tuesday, which means that big companies released some major updates.

Microsoft released 16 updates that cover security flaws in Windows, Internet Explorer, Edge, Office and others.

Adobe fixed security holes in Acrobat and Reader. On Thursday, the company also released an update for its buggy Flash Player, that solves critical security flaws.

You should also update Chrome, if that’s the browser you use. Google fixed 5 security vulnerabilities in its latest update.


2. Mail.Ru says that leaked credentials were invalid

Remember last week’s major data breach, with the 272 million stolen credentials that were being traded in Russia? Mail.ru says that 99.55% of the leaked credentials were outdated and calls the security report to be just a “media hype”.


3. 7-Zip vulnerabilities

Security holes found in compression tool 7-Zip would allow attackers to gain control of PC.


4. Europol Chief says that encryption gets in the way of 75% of all Europol cases

Here’s a new important argument in the debate surrounding encryption: Rob Wainwright, director of Europol, says that encryption gets in the way of 75% of all Europol cases.


5. Panama Papers: How did the biggest document leak happen?

Curious to find out how did the biggest document leak happen? This article will shed light over Panama Papers.

P.S. Spoiler alert: SQL Injection, DROWN and 25 vulnerabilities.


6. How cyber criminals carried a successful spear-phishing attack on a small luxury hotel chain

“Hotel chains focus on hospitality, but their security practices have made them entirely too hospitable a target for data theft.”


7. Will a visit to The Pirate Bay end up in malware?

Scared that torrents might infect your system with malware? Then you should read this.

“One place where you might assume there would be lots of malware is infamous file-sharing site The Pirate Bay. […] On the other hand, you can argue that it would be rare to find pirated movies that were infected with malware, for two main reasons: […]”


8. Where are your cyber attacks coming from?

Using the information from the Verizon 2015 Data Breach Investigation Report, TripWire created an infographic that shows where are the cyber attacks most likely to originate.


9. ​Why I Hate Security, Computers, and the Entire Modern Banking System

An opinion article we ran into recently:

“I live in a world where the NSA secretly compromises encryption standards, where the FBI remotely hacks computers in the Tor network, where hackers hold the contents of your hard drive for ransom. And meanwhile, my bank is treating my routing and account numbers like “Open Sesame” – magic words that work whether you’re trying to get into the cave, or get out of the cave.”


10. Here’s Why You Should Take All Your Photos Off the Internet Now

Here’s an interesting article related to the privacy threats of facial recognition (plus some great reasons for the paranoid ones to take all their photos off the internet).


Conclusion


New threats appear to be the same as the old ones, but with a twist.

It’s essential that you keep in check your security habits: set strong and unique passwords, install multiple layers of security, keep your software up to date, remove apps that make you vulnerable, and always remember to back up, back up, back up.

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP
148 queries in 1.023 seconds