FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

How To Get Your Head Around Your Kids’ Online Gaming Life

By Alex Merton-McCann

Let’s be honest – many of us parents aren’t big fans of gaming. In fact, some of us have probably even been known to roll our eyes or groan when we think about just how long our kids spend playing online games. But if there is one thing I’ve learned after 25 years of parenting, it’s that taking the time to look at a stressful family situation from the perspective of my children, can be very powerful. In fact, it can almost always fast track finding a mutually agreeable work-around for everyone – and gaming is the perfect example.  

Why Do Our Kids Love Gaming? 

We have all read about how online gaming can provide players with regular hits of dopamine  –  a neurotransmitter in the brain that becomes active when you participate in fun and pleasurable activities. Now I am not disputing this for a moment – I’ve witnessed it firsthand! However, it is important to remember that dopamine increases whenever we do anything enjoyable – pop a square of chocolate in our mouth or watch our favorite sporting team win – not just when we play online games. 

Many online games have cleverly designed built-in reward systems, and many experts believe that it is the combination of dopamine and reward that probably best explains why our kids are such gaming fans. Now, these reward systems are intentionally unpredictable so players are aware they will eventually get a reward, but they have no idea as to when or how often it is coming – so they are compelled to keep playing! Very clever! 

In my opinion, gaming also fills several other needs in our children – the need to belong, to feel competent and be independent. And while we may have had these needs addressed very differently in the 70’s and 80’s – hanging at the bus stop, mastering the Rubix cube and not being helicopter parented, our batch of digital natives will often use gaming as their go-to solution. 

Why You Should See Gaming Through The Eyes of Your Child 

When many of us parents think about our kids’ online gaming, our initial thought is ‘how do we make our kids stop’. But I can you this isn’t the right approach. Online gaming isn’t going anywhere. So, taking the time to see gaming from your child’s perspective and understand why it is such a big part of their life is where you need to focus your energy. I guarantee this will further strengthen your relationship with your child and help you introduce rules that they will better respect. 

Let’s take a moment to channel the great Atticus Finch from To Kill a Mockingbird and focus on his words of inspiration for us all: ‘“You never really understand a person until you consider things from his point of view…until you climb into his skin and walk around in it.” Ah yes – very wise words! 

My Top Tips For A Happy Gaming Family 

So, if you are keen to stop gaming being a negative issue in your family, here are my top tips to help you get it under control and stop it causing family tension: 

1. Change Your Thinking 

If you find yourself thinking ‘how do I get my kids to stop gaming’, you’re barking up the wrong tree. Gaming isn’t going anywhere and as parents, we don’t want to drive an unnecessary wedge between ourselves and our kids. Instead, commit to having an open mind. Think ’Ok, let’s give this gaming thing a go’. 

2. Talk To Your Kids About Their Gaming – With No Tone 

When the time is right, ask your kids what their favourite games are and why. Your aim is to get them talking. You could even do your research in advance and drop in the names of a few popular games to ask them about. ‘My work friend’s son plays Roblox, do you know much about that?’ 

3. Play Along! 

Even if you aren’t that interested, I promise, playing along will open your eyes. You’ll better understand how the game’s reward system works and what it feels like to get a shot of digital dopamine! And most importantly, it will be great for your relationship with your child. By taking the time to play with them, you are showing that you are interested in their life and their hobbies.   

4. Educate Yourself About All Thing Gaming 

When your kids started their social media journey, chances are you spent a little time familiarising yourself with the various platforms they joined. Well, you need to adopt the same approach with their gaming life too. Here are a few areas to focus on:  

  • Check out Discord – an online community where a lot of gamers spend time sharing tips and ‘cheats’. Check out an article I wrote about Discord here. 
  • Suss out Twitch – it’s a live streaming video gaming site where loads of kids spend loads of time watching others game. Yes, this is a thing!  
  • Big time gamers are now considered ‘influencers’. It’s not uncommon for tweens and teens to watch then play on Twitch, subscribe to their YouTube channel, and then follow them on Instagram. They can have a lot of sway! 
  • Do your research on the games your kids play. Having an open mind about gaming doesn’t mean it’s OK for them to play games that are not age-appropriate.  

5. Introduce Fair, Age-Appropriate Rules Around Gaming 

Once you’ve taken the time to understand your child’s gaming life, cleared your mind of any unnecessary negative gaming thoughts and done your research, why not put together a set of family rules for gaming? You may like to consider a family tech agreement and have a separate section for gaming. Or you may prefer to keep it more casual and have the rules written on the fridge or shared in the family group chat. Regardless of what you choose, ensure that you introduce these boundaries when everyone is calm and in a good head space NOT when you’re in the middle of a verbal stoush! 

You could choose to give your children a set amount of time they can use each week on gaming and then let them choose when to use it or you allocate a small time everyday once they’ve completed homework and chores. When my boys were younger, I didn’t allow gaming Monday – Thursday but after school Friday was always quite the gaming fest – a reward for getting through the school week. Do what works for your family!   

There’s no question that this digital parenting gig is complicated. Trying to help your kids find the right balance between embracing the online world and offline world can often feel hard to get right. But if you’re ever in doubt about whether you’re on track when it comes to managing your kids’ gaming, always ask yourself – have I kept an open mind? Have I taken the time to talk to my kids and understand their gaming life? Are the gaming rules fair? And, if you have answered yes, then I have every confidence that you have the right approach to ensuring gaming is a positive part of your family’s life.  

The post How To Get Your Head Around Your Kids’ Online Gaming Life appeared first on McAfee Blog.

Phishers Swim Around 2FA in Coinbase Account Heists

By Elizabeth Montalbano
Attackers are spoofing the widely used cryptocurrency exchange to trick users into logging in so they can steal their credentials and eventually their funds.

A Digital Home Has Many Open Doors

By Scott Cadzow, Chair, ETSI Encrypted Traffic Integration ISG
Development of digital gateways to protect the places where we live, work, and converse need to be secure and many doors need to offer restricted access.

  • August 5th 2022 at 14:00

How to Resolve Permission Issues in CI/CD Pipelines

By Asim Rahal, InfoSec consultant
This Tech Tip outlines how DevOps teams can address security integration issues in their CI/CD pipelines.

  • August 5th 2022 at 14:00

Open Redirect Flaw Snags Amex, Snapchat User Data

By Elizabeth Montalbano
Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.

Open Redirect Flaw Snags Amex, Snapchat User Data

By Elizabeth Montalbano
Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.

All the Data Amazon's Ring Cameras Collect About You

By Matt Burgess
The popular security devices are tracking (and sharing) more than you might think.

Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages

By Ravie Lakshmanan
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. If left unpatched, the issues could allow an adversary to issue fraudulent emergency alerts over TV, radio, and cable networks. The August 1 advisory comes courtesy of DHS' Federal Emergency Management Agency (FEMA). CYBIR security researcher Ken

Resolving Availability vs. Security, a Constant Conflict in IT

By The Hacker News
Conflicting business requirements is a common problem – and you find it in every corner of an organization, including in information technology. Resolving these conflicts is a must, but it isn’t always easy – though sometimes there is a novel solution that helps. In IT management there is a constant struggle between security and operations teams. Yes, both teams ultimately want to have secure

A Growing Number of Malware Attacks Leveraging Dark Utilities 'C2-as-a-Service'

By Ravie Lakshmanan
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal of commandeering compromised systems. "It is marketed as a means to enable remote access, command execution, distributed denial-of-service (DDoS) attacks and cryptocurrency mining operations on infected systems," Cisco Talos said in a report shared

Critical flaws found in four Cisco SMB router ranges – for the second time this year

At least Switchzilla thinks they're salvageable, unlike the boxes it ordered binned back in June

Cisco has revealed four of its small business router ranges have critical flaws – for the second time in 2022 alone.…

  • August 5th 2022 at 06:57

CISA Adds Zimbra Email Vulnerability to its Exploited Vulnerabilities Catalog

By Ravie Lakshmanan
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a recently disclosed high-severity vulnerability in the Zimbra email suite to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue in question is CVE-2022-27924 (CVSS score: 7.5), a command injection flaw in the platform that could lead to the execution of arbitrary

Bloke robbed of $800,000 in cryptocurrency by fake wallet app wants payback from Google

I got played via the Play store

Last October, California resident Jacob Pearlman downloaded an Android version of a cryptocurrency wallet app called Phantom from the Google Play app store.…

  • August 4th 2022 at 23:45

Cyberattackers Increasingly Target Cloud IAM as a Weak Link

By Tara Seals, Managing Editor, News, Dark Reading
At Black Hat USA, Igal Gofman plans to address how machine identities in the cloud and the explosion of SaaS apps are creating risks for IAM, amid escalating attention from attackers.

  • August 4th 2022 at 21:43

An Attack on Albanian Government Suggests New Iranian Aggression

By Lily Hay Newman
A Tehran-linked hack of a NATO member marks a significant escalation against the backdrop of US-Iran nuclear talks.

Amazon, IBM Move Swiftly on Post-Quantum Cryptographic Algorithms Selected by NIST

By Jeffrey Schwartz, Contributing Writer
A month after the algorithms were revealed, some companies have already begun incorporating the future standards into their products and services.

  • August 4th 2022 at 21:03

Time to Patch VMware Products Against a Critical New Vulnerability

By Dark Reading Staff, Dark Reading
A dangerous VMware authentication-bypass bug could give threat actors administrative access over virtual machines.

  • August 4th 2022 at 20:36

Bug in Kaspersky VPN Client Allows Privilege Escalation

By Tara Seals, Managing Editor, News, Dark Reading
The CVE-2022-27535 local privilege-escalation security vulnerability in the security software threatens remote and work-from-home users.

  • August 4th 2022 at 18:35

How Email Security Is Evolving

Securing email communication has never been more critical for organizations, and it has never been more challenging to do so. Attack volumes have increased and become more sophisticated.
  • August 4th 2022 at 18:05

Scammers Sent Uber to Take Elderly Lady to the Bank

By BrianKrebs

Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the bank and wired money to the fraudsters.  In this case, the woman figured out she was being scammed before embarking for the bank, but her story is a chilling reminder of how far crooks will go these days to rip people off.

Travis Hardaway is a former music teacher turned app developer from Towson, Md. Hardaway said his mother last month replied to an email she received regarding an appliance installation from BestBuy/GeekSquad. Hardaway said the timing of the scam email couldn’t have been worse: His mom’s dishwasher had just died, and she’d paid to have a new one delivered and installed.

“I think that’s where she got confused, because she thought the email was about her dishwasher installation,” Hardaway told KrebsOnSecurity.

Hardaway said his mom initiated a call to the phone number listed in the phony BestBuy email, and that the scammers told her she owed $160 for the installation, which seemed right at the time. Then the scammers asked her to install remote administration software on her computer so that they could control the machine from afar and assist her in making the payment.

After she logged into her bank and savings accounts with scammers watching her screen, the fraudster on the phone claimed that instead of pulling $160 out of her account, they accidentally transferred $160,000 to her account. They said they they needed her help to make sure the money was “returned.”

“They took control of her screen and said they had accidentally transferred $160,000 into her account,” Hardaway said. “The person on the phone told her he was going to lose his job over this transfer error, that he didn’t know what to do. So they sent her some information about where to wire the money, and asked her to go to the bank. But she told them, ‘I don’t drive,’ and they told her, “No problem, we’re sending an Uber to come help you to the bank.'”

Hardaway said he was out of town when all this happened, and that thankfully his mom eventually grew exasperated and gave up trying to help the scammers.

“They told her they were sending an Uber to pick her up and that it was on its way,” Hardaway said. “I don’t know if the Uber ever got there. But my mom went over to the neighbor’s house and they saw it for what it was — a scam.”

Hardaway said he has since wiped her computer, reinstalled the operating system and changed her passwords. But he says the incident has left his mom rattled.

“She’s really second-guessing herself now,” Hardaway said. “She’s not computer-savvy, and just moved down here from Boston during COVID to be near us, but she’s living by herself and feeling isolated and vulnerable, and stuff like this doesn’t help.”

According to the Federal Bureau of Investigation (FBI), seniors are often targeted because they tend to be trusting and polite. More importantly, they also usually have financial savings, own a home, and have good credit—all of which make them attractive to scammers.

“Additionally, seniors may be less inclined to report fraud because they don’t know how, or they may be too ashamed of having been scammed,” the FBI warned in May. “They might also be concerned that their relatives will lose confidence in their abilities to manage their own financial affairs. And when an elderly victim does report a crime, they may be unable to supply detailed information to investigators.”

In 2021, more than 92,000 victims over the age of 60 reported losses of $1.7 billion to the FBI’s Internet Crime Complaint Center (IC3). The FBI says that represents a 74 percent increase in losses over losses reported in 2020.

The abuse of ride-sharing services to scam the elderly is not exactly new. Authorities in Tampa, Fla. say they’re investigating an incident from December 2021 where fraudsters who’d stolen $700,000 from elderly grandparents used Uber rides to pick up bundles of cash from their victims.

Massive China-Linked Disinformation Campaign Taps PR Firm for Help

By Nathan Eddy, Contributing Writer, Dark Reading
A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.

  • August 4th 2022 at 15:16

Phylum Releases a Free Community Edition to Make Software Supply Chain Security More Accessible

Users can identify risks across five domains, work on multiple projects, and take advantage of exclusive community benefits.
  • August 4th 2022 at 14:50

The Myth of Protection Online — and What Comes Next

By Steve Ryan, Founder & CEO, Trinity Cyber
It's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained incident response reactions.

  • August 4th 2022 at 14:00

Deep Instinct Pioneers Deep-Learning Malware Prevention to Protect Mission-Critical Business Applications at Scale

Agentless approach meets the attacker earlier to protect financial services and other large enterprises from an underserved attack vector.
  • August 4th 2022 at 13:26

35K Malicious Code Insertions in GitHub: Attack or Bug-Bounty Effort?

By Robert Lemos, Contributing Writer, Dark Reading
In the last month, "Pl0xP" cloned several GitHub repositories, adding malicious code to the forks that would attempt to infect developer systems and steal sensitive files that included software keys.

  • August 4th 2022 at 13:21

Ping Identity to Go Private After $2.8B Acquisition

By Dark Reading Staff, Dark Reading
The identity-services company is being acquired by Thoma Bravo software investment for cash, before being delisted.

  • August 4th 2022 at 13:17

Taiwanese military reports DDoS in wake of Pelosi visit

Controversial visit to Taiwan continues to reverberate through cyberspace, the real world, and the semiconductor industry

Taiwan's Ministry of National Defense confirmed it was hit by a DDoS attack on Wednesday in what has been an eventful week for the island nation, US-Sino relations, and semiconductors.…

  • August 4th 2022 at 12:23

Don’t get singed by scammers while you’re carrying the torch for Tinder 

By André Lameiras

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.

The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

India scraps data protection law in favor of better law coming … sometime

Tech giants and digital rights groups didn't like it, but at least it was a law

The government of India has scrapped the Personal Data Protection Bill it's worked on for three years, and announced it will – eventually – unveil a superior bill.…

  • August 4th 2022 at 06:58

Student crashes Cloudflare beta party, redirects email, bags a bug bounty

Simple to exploit, enough to pocket $3,000

A Danish ethical hacker was able to work his way uninvited into a closed Cloudflare beta and found a vulnerability that could have been exploited by a cybercriminal to hijack and steal someone else's email.…

  • August 4th 2022 at 06:31

UK Parliament bins its TikTok account over China surveillance fears

Plan to educate the children turned out to be a 'won't someone think of the children?' moment

The UK's Parliament has ended its presence on TikTok after MPs pointed out the made-in-China social media service probably sends data about its users back to Beijing.…

  • August 4th 2022 at 05:58

Solana, Phantom blame Slope after millions in crypto-coins stolen from 8,000 wallets

SOL holders literally S.O.L.

Millions of dollars worth of Solana cryptocurrency and other tokens were stolen from seemingly thousands of netizens this week by thieves exploiting some kind of security weakness or blunder.…

  • August 4th 2022 at 03:26

Startup Footprint Tackles Identity Verification

By Dark Reading Staff, Dark Reading
Early-stage startup Footprint's goal is to provide tools that change how enterprises verify, authentication, authorize, and secure identity.

  • August 3rd 2022 at 23:50

Microsoft widens enterprise access to its threat intelligence pool

Organizations can be more proactive in tracking threats, finding holes in their protection

Microsoft says it will give enterprise security operation centers (SOCs) broader access to the massive amount of threat intelligence it collects every day.…

  • August 3rd 2022 at 21:31

How IT Teams Can Use 'Harm Reduction' for Better Cybersecurity Outcomes

By Tara Seals, Managing Editor, News, Dark Reading
Copado's Kyle Tobener will discuss a three-pronged plan at Black Hat USA for addressing human weaknesses in cybersecurity with this medical concept — from phishing to shadow IT.

  • August 3rd 2022 at 21:25

Critical RCE Bug in DrayTek Routers Opens SMBs to Zero-Click Attacks

By Tara Seals, Managing Editor, News, Dark Reading
SMBs should patch CVE-2022-32548 now to avoid a host of horrors, including complete network compromise, ransomware, state-sponsored attacks, and more.

  • August 3rd 2022 at 20:23

Ex-T-Mobile US store owner phished staff, raked in $25m from unlocking phones

That's just the tip of the iceberg – and now he faces potentially years in the clink

A now-former T-Mobile US store stole at least 50 employees' work credentials to run a phone unlocking and unblocking service that prosecutors said netted $25 million.…

  • August 3rd 2022 at 20:17

School Kid Uploads Ransomware Scripts to PyPI Repository as 'Fun' Project

By Jai Vijayan, Contributing Writer, Dark Reading
The malware packages had names that were common typosquats of a legitimate widely used Python library. One was downloaded hundreds of times.

  • August 3rd 2022 at 19:57

Cyberattackers Drain Nearly $6M From Solana Crypto Wallets

By Dark Reading Staff, Dark Reading
So far, the ongoing attack has impacted nearly 8,000 Solana hot wallets.

  • August 3rd 2022 at 17:42

Sonatype shines light on typosquatting ransomware threat in PyPI

It's all fun and games until somebody gets their files encrypted

Miscreants making use of typosquatting are being spotted by researchers at Sonatype, emphasizing the need to check that the package is really the one you meant to download.…

  • August 3rd 2022 at 17:15

Zero-Day Defense: Tips for Defusing the Threat

By Ryan Barnett, Principal Security Researcher, Akamai
Because they leave so little time to patch and defuse, zero-day threats require a proactive, multilayered approach based on zero trust.

  • August 3rd 2022 at 17:00

The Microsoft Team Racing to Catch Bugs Before They Happen

By Lily Hay Newman
What's it like to be responsible for a billion people's digital security? Just ask the company's Morse researchers.

You can’t choose when you’ll be hit by ransomware, but you can choose how you prepare

Without a road to recovery, you’re just going to be roadkill

Sponsored Feature What sort of disaster would you rather prepare for? Hurricanes are destructive, but you know when one's coming, giving you time to take defensive action. Earthquakes vary in their destructive power, but you never know when they're going to hit, meaning your ability to recover after the impact is critical.…

  • August 3rd 2022 at 15:46

ShiftLeft Appoints Prevention-First, Cybersecurity Visionary and AI/ML Pioneer Stuart McClure as CEO

Serial entrepreneur, cybersecurity leader, and industry veteran joins ShiftLeft to drive growth and AI/ML innovation globally.
  • August 3rd 2022 at 15:38

Druva Introduces the Data Resiliency Guarantee of up to $10 Million

The new program offers robust protection across all five data risk categories: cyber, human, application, operation, and environmental.
  • August 3rd 2022 at 15:33

CompTIA CEO Outlines Initiative to Create the Pre-eminent Destination to Start, Build and ‘Supercharge’ a Tech Career

Todd Thibodeaux uses ChannelCon 2022 state of the industry remarks to unveil CompTIA’s Project Agora; invites broad industry participation in the effort to fight for tech talent.
  • August 3rd 2022 at 15:21
❌