A Step-by-Step Guide to Clearing Your Browser History and Wipe Away Your Online Footprint

The process for clearing your Internet browser history can vary depending on your browser. However, here are the general steps for removing your browser history on some popular browsers…

https://craigpeterson.com/browsers/a-step-by-step-guide-to-clearing-your-browser-history-and-wipe-away-your-online-footprint/38583/

Generation Z is the least cyber secure because they are the most tech-savvy generation but also the least experienced in cyber security. 

They are likelier to take risks online, such as clicking on suspicious links or downloading unknown files and are less likely to use strong passwords or two-factor authentication. Additionally, they may not be aware of their actions’ potential consequences, such as identity theft or data breaches.

https://craigpeterson.com/cyber-breaches/small-business-owners-be-wary-of-relying-on-younger-family-members-or-employees-to-manage-their-cybersecurity/38585/

Electric Cars…

Security and the Electric Vehicle Charging Infrastructure Failing US

https://www.darkreading.com/attacks-breaches/security-and-the-electric-vehicle-charging-infrastructure

The communications networks that connect chargers with their management system, the personal data that travels across those networks, the charge-point operators collecting payments, and the grid itself are increasingly vulnerable as the EV ecosystem grows and the attack surface expands. The risks include (but are not limited to):

  • Disruption of operations for public charger networks, rendering large numbers of chargers unusable and interfering with transportation
  • A takeover of charger networks to use the chargers as bots in massive distributed denial-of-service (DDoS) attacks
  • Theft of customers’ personal identifiable information (PII), including payment card information
  • Fraudulent payments for electricity used in EV charging
  • Disruption to the power grid, leading to blackouts and equipment damage
  • Damage to the EV charging provider’s reputation

Google…

Google Pushes Privacy to the Limit in Updated Terms of Service

https://www.darkreading.com/edge-articles/google-play-terms-of-service-push-privacy-to-the-limit

Google has a long history of searching the Play Store, its app repository, for programs that contain malware. Less than a year ago, Google removed multiple apps from the Play Store that had the banking Trojan SharkBot hidden inside.

However, while removing troublesome apps from the Play Store would seem prudent, Google takes this one step further into a legal gray area.

Debbie Reynolds says that Google’s ToS is ambiguous because it is unclear precisely what it might block or remove that is “known to be harmful to the device, data or users.” The ToS also does not commit Google to tell users when it makes such a deletion.

Ransomware…

Ransomware Profits Decline as Victims Dig In, Refuse to Pay

https://www.darkreading.com/attacks-breaches/ransomware-profits-decline-victims-refuse-pay

In another sign that the tide may finally turn against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers.

“Our findings suggest that a combination of factors and best practices — such as security preparedness, sanctions, more stringent insurance policies, and the continued work of researchers — are effective in curbing payments.”

“The businesses that are most inclined not to pay are those that are well prepared for a ransomware attack.”

Privacy…

Why your data is more valuable than you may realize

https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/

The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think.

Use a GPS map app to find a restaurant that specializes in a particular cuisine, and the search provider can ascertain that you eat out, what day of the week you eat out, possibly how frequently, how far you are prepared to travel, possible food preference, the time of day you eat, etc. In this case, the snippet of data was just the name of the restaurant, yet the resulting information that can be deduced from the action can be significant.

Understanding how data is collected and the conclusions that can be drawn is complicated and likely a topic that is interesting when someone explains it but probably too complex for any actions to avoid collection. I would hazard a guess that even those in the know, so to speak, likely give away more information than they realize.

Dark Web…

Business Insiders Pose a Huge Threat – Hunting Insider Threats on the Dark Web

https://www.darkreading.com/threat-intelligence/hunting-insider-threats-on-the-dark-web

According to recent research, malicious employees contribute to 20% of incidents, and the attacks that insiders are involved in are, on average, ten times larger than those conducted by external actors. Further data has shown an increase in insider threat attacks over the past two years, as the risk has been exacerbated by remote working through the pandemic.

To minimize insider threats, all organizations should monitor marketplaces, forums, and social media channels for chatter about their company. This helps them to spot the early warning signs of an imminent attack, such as cybercriminals looking for insider knowledge or disgruntled employees making unsavory comments.

Listen to this episode