fbpx
Some people say the only way to stop online harassment is to stop going online. Well, we aren't going anywhere. Reclaim Your Domain is Refinery29's campaign to make the internet (and the world of outside it) a safer space for everyone — especially women. If Kim Kardashian's robbery...
Keeping malware off of your mobile device should be a top priority for anyone who purchases a new smartphone or tablet, but what if the battle against bad actors has been lost before you even open the box? That’s exactly what security firm Check Point says is happening right now, and it just relea...
Cloudflare, which operates a widely used web content delivery network, announced a security bug on February 23 that caused sensitive data to leak from its customers’ websites.  The exact number of websites potentially affected is unknown but some estimates place the total ...
More details surrounding the voluntary anti-piracy agreement between Google, Bing, and major rightsholders have emerged. In addition to efforts to mitigate pirate sites' efforts to jump domains to avoid downranking, the search engines will "exchange detailed information" with rightsholders "on a con...
The malware, developed during a hackathon between British and American spies, turns ordinary smart TVs into listening devices. Buried in a trove of classified and secret CIA documents leaked earlier on Tuesday are files that show British and American spies worked closely together to hack i...
Last month cybersecurity firm Nuix released The Black Report, a white paper that contains specific tactics used by hackers, cybersecurity experts, and CISO and CSOs to attack and defend systems. The report, dissected extensively by ZDNet, found that some widely used defensive tactics are u...
  • Saturday, 04 March 2017 15:16
  • By:
With numerous high profile security breaches and hacks in the news, privacy and security are at top of mind for many. It's not just about emails either, all of your data is at risk including photos, text messages, files, and browser history. It's more important than ever to keep your personal data s...
University of Washington researchers have shown that Google’s new machine learning-based system to identify toxic comments in online discussion forums can be bypassed by simply misspelling or adding unnecessary punctuation to abusive words, such as “idiot” or “moron.” Perspective is a...
Think about everything that lives on your phone: personal messages and emails, photos of your friends and family, social media posts, phone numbers, maybe work emails or dating apps. And then there’s your search history and bookmarks, location history, passwords, calendar, call logs … basically...
  • Wednesday, 01 March 2017 17:17
  • By:
Thanks to Google and Tavis Ormandy, your personal information is secure. If you are a frequent user of Uber, Ok Cupid or FitBit, then know that your passwords, messages or the content of your emails might not be personal anymore. Someone out there might be going through your emails or reading your m...
Google is attempting to tackle one of the most hostile places on the Internet: comment sections. This week, the search engine announced a new project called Perspective in collaboration with Jigsaw, a tech incubator owned by Google's parent company.   "Imagine trying to have a conversatio...
  • Monday, 27 February 2017 11:06
  • By:
Android still tends to be the default platform although iOS versions are usually available after a short delay. The issue of platform support is more important that it might appear. Even if you don’t personally use an iPhone, say, the fact that your favoured contacts do will render any app that do...
Cloudflare revealed yesterday that a bug in its code caused sensitive data to leak from some of the major websites that use its performance enhancement and security services. Uber, Fitbit, OkCupid and 1Password are among Cloudflare’s millions of clients, and it’s possible that per...
We recently commented that the sale of Yahoo which will occur with a discount of 250 million dollars due to the security problems they have had in the past, two hacks that managed to break records in the list of “filtered data”. Now comes another negative news from the company about the third ha...
What happens if a bad actor turns off your heat in the middle of winter, then demands $1,000 to turn it back on? Or even holds a small city’s power for ransom? Those kinds of attacks to personal, corporate, and infrastructure technology were among the top concerns for security experts from the SAN...
  • Friday, 17 February 2017 14:48
  • By:
Any job offers extended from www.rds-usa.com should not be accepted. BBB learned that the domain for the website is registered in Hong Kong and isn’t the site it’s pretending to be. The fake website has details designed to make it look like it represents a local company – Rapid Delivery Servic...
Mention spam and the first thought in your head might be of those unwanted emails promising easy money and get rich quick schemes that cram your inbox. But what you might not know is that another kind of spamming can have detrimental effects to your small business’s online presence too. That...
Most people would be truly alarmed if they understood how easily criminals can hack into their cell phones and retrieve personal and potentially damaging information. Criminals today have devices that allow them to hack into your cell phone by just dialing the number. In fact, with this te...
Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded. The methods—known as canvas fingerprinting, evercookies and cookie syncing—are in use across a range of popular websites. The fin...
Banks around the world have been the target of malware attacks for quite some time now. Criminals continue to step up their game in this department, as fileless malware is starting to become a lot more mainstream as of late. A very troublesome development, to say the least, as it seems impossible to...
Three methods of research find that the situation in which an online discussion occurs influences whether people will troll more than their personal past of trolling suggests. Internet trolls, by definition, are disruptive, combative and often unpleasant with their offensive or provocative online p...
Attacks on WordPress sites using a vulnerability in the REST API, patched in WordPress version 4.7.2, have intensified over the past two days, as attackers have now defaced over 1.5 million pages, spread across 39,000 unique domains. Initial attacks using the WordPress REST API flaw were reported on...
  • Friday, 10 February 2017 10:54
  • By:
According to a security research firm, over 60,000 websites that haven’t been updated to the most recent WordPress version 4.7.2 are under attack in a mass defacement campaign. WordPress 4.7.2 was released two weeks ago fixing a vulnerability in the WordPress REST API. “An unauthentica...
Indian police have busted an internet scam in which around 650,000 people lost a combined 3700 crores rupees ($549 million) after sending money to a company that promised they would earn cash by clicking on web links, police said on Friday. Police, who described the pyramid-style scheme as one of In...
If you’re active in online communities or on social media sites, you may have experienced what many savvy Internet users call “Internet Trolls.” It may sound funny, but “Internet Trolls” are people who lurk online searching and waiting to attack strangers on the internet. Myles McNutt, a C...

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media