Source: National Cyber Security – Produced By Gregory Evans Social media is a conduit for thieves to get personal data (they can use it, for instance, to open up a credit line in the victim’s name). Though many people are concerned their personal information will get in the wrong hands,…
New Social Media Cybersecurity Training Website Equips Employees To Prevent Cyber Attacks
Source: National Cyber Security – Produced By Gregory Evans SocialMediaAndCyberSecurity.com (SMCS). Henderson has over 20 years of experience in technology sales management and holds an MBA from the New York Institute of Technology. His flagship course is a full-day Cybersecurity awareness program that helps participants appreciate how their organization’s computers…
Cyber Crime Makes Americans Rethink Social Media
Source: National Cyber Security – Produced By Gregory Evans Based on the results of a new USA Network study, the proliferation of cyber crimes and security breaches may place America on the verge of a social media shutdown. But when it comes to taking precautions to protect themselves online, most…
Panel discussion on media portrayals of black women at KSU
On Thursday, March 19th, Atlanta Free Speech, in collaboration with the African & African Diaspora Studies Student Research and Engagement Conference (AADS) at Kennesaw State University (KSU), will host a panel discussion in recognition of Women’s History Month titled, Black Feminism and the Portrayal of Black Women in the Media. A century following prominent…
Sunbury Neighbourhood Watch group turns to social media to combat crime
Source: National Cyber Security – Produced By Gregory Evans The group last week launched Facebook and Twitter pages and will also partner community initiatives such as Safe Plate Days and other awareness campaigns in shopping centres, schools and sporting clubs. Co-ordinator Ben Riley said the Neighbourhood Watch still had an…
U.S. Central Command Social Media Accounts Hacked and Taken Down
The Twitter and YouTube accounts purported to belong to CENTCOM were apparently hacked this afternoon. CENTCOM, or U.S. Central Command, is the mega-regional command responsible for military actions in Northern Africa, the Middle East, and Central Asia. CENTCOM For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View…
Women should be more alert while posting pictures on social media, suggests celeb hacker
India’s only ‘ethical hacker’ Ankit Fadia says to stop cyber crimes vulnerable targets like women, should be more alert about posting their pics. Admitting that a large section of cyber crime victims are women, Fadia suggests any suspicion or misgivings […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
Social Media Security Podcast 34 – Facebook Privacy, LinkedIn Scammers, Naughty Employees
This is the 34th episode of the Social Media Security Podcast sponsored by SecureState and the Streetwise Security Zone. This episode was hosted by Tom Eston and Scott Wright recorded June 18th 2014. Below are the show notes, links to articles and news mentioned in the podcast: Facebook Switches For more information go to http://www.NationalCyberSecurity.com, http://www….
Social Media Security Podcast 33 – Heartbleed, Hashtag Fail, Social Impersonation
Guess what? We’re back! This is the 33rd episode of the Social Media Security Podcast sponsored by SecureState. This episode was hosted by Tom Eston and Scott Wright recorded May 15, 2014. Below are the show notes, links to articles and news mentioned in the podcast: Social Media sites affected by Heartbleed NYPD Twitter hashtag…
How to Securely Erase Removable Media Using Windows 7
In a companion post, How to Securely Erase Removable Media Using Mac OS X, I explain how physical loss, theft or improper disposal of laptops or removable drives is the most common data breach of electronic personal health information. Personal identifying or health data disclosure are too frequent outcomes of…