you

Planes, Gate, And Bags: How Hackers Can Hijack Your Local Airport











you

THC/vonJeek Provide You The Ability To Clone ePassports






you

Yes, You Can Remotely Hack Factory, Building Site Cranes. Wait, What?





you

COVID-19 Malware Wipes Your PC And Rewrites Your MBR











you

Johnny You Are Fired

This archive contains proof of concepts and a whitepaper that describes multiple email client implementations where popular clients for email are vulnerable to signature spoofing attacks.




you

Two French Teenagers Charged Over Despacito YouTube Hack





you

Improve Your Fundraising Approach and Skills at NetSquared Meetups

Fall has arrived, and with it comes fundraising season. More than one-third of charitable giving happens in the last three months of the year, and the emergence of Giving Tuesday (on November 28 this year) makes the year's end even more critical for charities.

Feeling overwhelmed? Your local NetSquared group is here to help with free, in-person events being held across the U.S. and the globe.

Naples, Florida, is hosting a meetup on tools for effective email fundraising; Chippewa Falls, Wisconsin, is hosting a series of Giving Tuesday brainstorming sessions; and Chicago, Illinois, will explore how your CRM can save end-of-year fundraising plans.

With more than 75 events scheduled for October, there's probably an event scheduled for your community, so RSVP now for one of our meetups.

Join us!

Upcoming Tech4Good Events

This roundup of face-to-face nonprofit tech events includes meetups from NetSquared, NTEN's Tech Clubs, and other awesome organizations. If you're holding monthly events that gather the #nptech community, let me know, and I'll include you in the next community calendar, or apply today to start your own NetSquared group.

Jump to events in North America or go international with events in

North America

Monday, October 2, 2017

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Thursday, October 5, 2017

Friday, October 6, 2017

Monday, October 9, 2017

Tuesday, October 10, 2017

Wednesday, October 11, 2017

Thursday, October 12, 2017

Saturday, October 14, 2017

Monday, October 16, 2017

Tuesday, October 17, 2017

Wednesday, October 18, 2017

Thursday, October 19, 2017

Friday, October 20, 2017

Monday, October 23, 2017

Tuesday, October 24, 2017

Wednesday, October 25, 2017

Monday, October 30, 2017

Tuesday, October 31, 2017

Central and South America

Wednesday, October 4, 2017

Africa and Middle East

Sunday, October 1, 2017

Monday, October 2, 2017

Saturday, October 7, 2017

Wednesday, October 11, 2017

Friday, October 13, 2017

Saturday, October 14, 2017

Sunday, October 15, 2017

Saturday, October 21, 2017

Saturday, October 28, 2017

Asia and Pacific Rim

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Tuesday, October 10, 2017

Sunday, October 15, 2017

Europe and U.K.

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Friday, October 6, 2017

Saturday, October 7, 2017

Wednesday, October 11, 2017

Thursday, October 12, 2017

Saturday, October 14, 2017

Monday, October 16, 2017

Tuesday, October 17, 2017

Wednesday, October 18, 2017

Thursday, October 19, 2017

Wednesday, October 25, 2017

Thursday, October 26, 2017

Tuesday, October 31, 2017

Left photo: Gregory Munyaneza / NetSquared Rwanda / CC BY

Center photo: Chrispin Okumu / NetSquared Kenya / CC BY

Right photo: Chrispin Okumu / NetSquared Kenya / CC BY




you

Protecting Yourself from Malware with Better Password Security

4

In Week 1 of National Cybersecurity Awareness Month (NCSAM) we looked at spoofed emails, cybercriminals' preferred method of spreading malware. Today, in an effort to provide you with the best information out there to keep you safe online, we're hitting you with a double dose of cybersafety news.

Let's take look at the topics for Week 2 and 3 of National Cybersecurity Awareness Month: malware and password security. They're separate but related issues in the world of Internet crime prevention, and a better understanding of each is key to protecting your property and personal information in today's digital world.

Malware

Malware is an umbrella term used to describe software that is intended to damage or disable computers and computer systems. If you'd like, you can take a moment and watch this video on malware from Norton Security. But the best way to begin protecting yourself against this stuff is to learn about all the different types of malware that can affect your computer. There are tons, so we'll just go over the broader categories for now.

Viruses: Malicious bits of code that replicate by copying themselves to another program, computer boot sector, or document and change how a computer works. Viruses are typically attached to an executable file or program and spread once a user opens that file and executes it.

Worms: They're like viruses, but are different in terms of the way they're spread. Worms typically exploit a vulnerability or a weakness that allows an attacker to reduce a system's information assurance. Missed that last Windows update? You might be more vulnerable to worms.

Trojans: These look like legitimate pieces of software and are activated after a user executes them. Unlike a virus or a worm, a trojan does not replicate a copy of itself. Instead, it lurks silently in the background, compromising users' sensitive personal data.

Ransomware: This refers to a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking or threatening to erase the users' files unless a ransom is paid. You may recall the WannaCry attack that affected users across the globe this summer, only to be thwarted by the accidental discovery of a "kill switch" that saved people from the malicious software.

Spyware: This malware collects your personal information (such as credit card numbers) and often passes this information along to third parties online without you knowing.

You can check out more descriptions and examples of the types of malware that exist today at MalwareFox, a malware detection and removal software program.

Tips for Protecting Yourself Against Malware

Staying malware-free doesn't require an engineering degree. You can greatly reduce, if not completely eliminate, your chances of falling victim to malware by following these easy tips.

  • Keep your operating system current.
  • Keep your software up to date, particularly the software you use to browse the Internet.
  • Install antivirus and security software and schedule weekly scans. At TechSoup, we're protected by Symantec Endpoint Protection. At home, there are dozens of solutions you can use to protect yourself (PCMag lists many here).
  • Mind where you click. Think twice before you download torrent videos or free Microsoft Office templates from some random website.
  • Avoid public, nonpassword, nonencrypted Wi-Fi connections when you can. Use a VPN when you cannot.

Spread the Word

Let people know that TechSoup is helping you become more #CyberAware by sharing a message on your social media channels. If you tag @TechSoup on Twitter, we'll retweet the first two tweets. Remember, we're all in this together.

Password Security

Now that we've covered the nasty stuff that can make your life miserable if it ends up on your computer, let's go over some password security tips to help prevent malware from getting there in the first place. Using best practices when it comes to protecting your passwords is a proven way to protect your personal and financial information. Curious how knowledgeable you already are? Watch this video and take this quiz to enter a drawing for a $25 Amazon gift card!

First, let's go over some facts.

  • Passwords are the first line of defense to protect your personal and financial information.
  • A weak password can allow viruses to gain access to your computer and spread through TechSoup's or your family's network.
  • It's estimated that 73 percent of users have the same password for multiple sites and 33 percent use the same password every time. (Source: Digicert, May 2014)
  • Despite a small sample size of 1,110 U.S. adults, a recent YouGov survey still found that 28 percent of adults use the same passwords for most of their online accounts. (Source: Business Insider, October 2017).

Best Practices for Effective Password Protection

One great way to better protect yourself is by opting for a passphrase, which is much more difficult to crack than a single-word password. Here are some guidelines to creating one.

  • Pick a famous quote or saying and use the first letter of each word.
  • Add a number that you can remember.
  • Capitalize one letter.
  • Make it unique by adding the first letter of your company's name to the beginning or end of the passphrase.
  • Make it between 16 and 24 characters.

You should never write your password down, but if you must, never store user IDs and passwords together. Finally — even though it might seem unwieldy — you should always use a different password for each site that requires one. In today's world, everything is connected. A savvy hacker can easily breach your bank account, email, and medical records in one fell swoop if you're using the same password for all three.

Additional Cybersecurity Resources

In case you missed it, take a look at last week's post on recognizing suspicious emails.

Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens.

Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.




you

Keep Your Data Safe: The Joy of Locking Your Computer

Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it.

That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it.

Working Remotely Promotes Data Vulnerability

What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions.

Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected.

Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes.

Tips for Protecting Yourself

The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine.

For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out.

Screen Locking in Microsoft Windows

  • Press Ctrl+Alt+Delete and select Lock this computer
  • Press Windows+L

Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated.

Screen Locking in macOS

  • On an external keyboard or older laptops, press Ctrl+Shift+Eject
  • On a MacBook Air or Pro Retina, press Ctrl+Shift+Power

You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver).

Additional Cybersecurity Resources

Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.

Image: National Cyber Security Alliance




you

How Secure Is Your Shell? At Many Enterprises, Not Very




you

Envisioning the future of hydropower: What do you see?

On Tuesday, July 23 at the HydroVision International keynote, Vice President Marla Barnes asked the audience to close their eyes and envision their next vacation. “Are you sitting on a beach? Are you packing your family into the car for a wild adventure? What do you see,” she asked.




you

Powering the future… thanks to your neighbor’s renewable energy

Distributed Energy Resources (DER), such as residential solar panels, are not only changing the way energy systems operate, they also present an opportunity to change the way local communities operate by giving consumers the ability to sell excess energy, generated by microgrids or renewable set-ups, to their neighbors – it’s the new energy paradigm.




you

Understanding ‘safe harbor’ for extending your 30 percent solar ITC qualification

Just after the midnight hour of New Year’s Eve 2020, more than confetti will be abandoned on America’s sidewalks and parlors. Somewhere around $130 million dollars of Investment Tax Credit (ITC) from that year’s anticipated Commercial & Industrial solar projects will fall out from any hope of reaching the proverbial pocket books of the nation’s infrastructure investors (assuming 2000MW of C&I and Community solar, and a $2/w installation cost). On 1/1/20, the ITC drops to 26 percent, a first step to further decrease the following year.




you

It’s clean, powerful and available: Are you ready for hydrogen energy?

As the world responds to the challenges of climate change, energy systems are evolving, and evolving fast. The past 10 years have seen the rise (and dramatic cost reduction) of renewable energy such as wind and solar, to the extent that they are no longer considered alternative energy. They have become mainstream energy sources. Now, what will be the “next big thing” as the world shifts to a low carbon future?




you

Are you a global power & energy elite? Nominations are now open!

“Recognizing leaders in the power and energy industry not only gives us the opportunity to celebrate them and the projects that they are involved in, it also enables us to learn vital business and life lessons from these often exceptional individuals. We find out what makes them tick, what frustrates them and the processes they follow to address challenges – this is often inspiring, eye-opening stuff and cannot but contribute to the growth of the sector.“




you

Envisioning the future of hydropower: What do you see?

On Tuesday, July 23 at the HydroVision International keynote, Vice President Marla Barnes asked the audience to close their eyes and envision their next vacation. “Are you sitting on a beach? Are you packing your family into the car for a wild adventure? What do you see,” she asked.




you

30+ Web Tools and Services Reviewed For You

The market is crowded with tens of thousands of web tools and services, every day a new web product is being launched. It is super-simple and anybody can do it. How is that possible? Because technology advanced in an unimaginable way and now everything is possible by using the right web tools and services.

Launching a webshop or blog can be done in a couple of minutes. Creating a gorgeous logo or company branding is not taking more than a few minutes by using AI drive logo platforms. Same platforms are also available for building websites. Anything you want can be done with small costs or even for free.




you

Inspiring Young Women To Pursue Careers in Energy

At last night’s PennWell Awards Ceremony, Kim Greene, a 24-year veteran of the power industry, was named the POWER-GEN 2015 Woman of the Year.

Greene began her career as an engineer with Southern Company in 1991 and ascended to leadership roles at Mirant and Tennessee Valley Authority (TVA), before returning to Southern Company Services in 2013 to become President and CEO. She was a keynote speaker at POWER-GEN International in 2014.

Today, she serves as chief operating officer of Southern Company and is responsible for overseeing system operations, which include generation, transmission, engineering and construction services, system planning, and research and environmental affairs, as well as the company’s competitive wholesale generation businesses.




you

Want To Save the World with Your Brilliant Clean Energy Idea?

A new partnership between Enel and InnoCentive focuses on the power of the crowd to solve many of the world’s sustainable energy challenges.




you

Someday Soon Your Utility Will Help You Select Your Next Car

Utilities are — and have been for a long time — seeking better ways through which they can engage with their customers. According to Jeff Hamel, director of energy and housing partnerships at Google, the Nest smart thermostat, which is part of the hardware product line that Google provides, is a good example of a simple way that utilities are partnering with their customers.




you

Five Companies You’ve Definitely Heard of Join Up to Buy Solar Energy in Aggregation Deal

It’s hard to find a common thread between the business models of Gap, Bloomberg, Cox, Salesforce and Workday but today they are announcing that they all have one big thing in common: their desire to clean up their organizations’ energy supply by using renewable energy.




you

Treadmills That Generate Electricity May Be Headed For Your Gym

As scientists seek more ways to harness nature’s power to produce renewable energy, there’s one energy source burned naturally every day that isn’t being harnessed: calories.




you

Companies explore how to make your home smart and 100% renewable-powered

Big Oil wants to put a box in your hall closet that works like a human brain, can cut the lights, stop the refrigerator and will know how you move about in the privacy of your home better than you do.




you

It’s clean, powerful and available: Are you ready for hydrogen energy?

As the world responds to the challenges of climate change, energy systems are evolving, and evolving fast. The past 10 years have seen the rise (and dramatic cost reduction) of renewable energy such as wind and solar, to the extent that they are no longer considered alternative energy. They have become mainstream energy sources. Now, what will be the “next big thing” as the world shifts to a low carbon future?




you

Are you a global power & energy elite? Nominations are now open!

“Recognizing leaders in the power and energy industry not only gives us the opportunity to celebrate them and the projects that they are involved in, it also enables us to learn vital business and life lessons from these often exceptional individuals. We find out what makes them tick, what frustrates them and the processes they follow to address challenges – this is often inspiring, eye-opening stuff and cannot but contribute to the growth of the sector.“




you

Envisioning the future of hydropower: What do you see?

On Tuesday, July 23 at the HydroVision International keynote, Vice President Marla Barnes asked the audience to close their eyes and envision their next vacation. “Are you sitting on a beach? Are you packing your family into the car for a wild adventure? What do you see,” she asked.




you

Perspectives: Answering Your FAQs

I like websites that have sections called "Frequently Asked Questions" – FAQ, for short. Typically, the questions I have aren't new ones … others looking at that site have asked the same thing. It's an efficient, quick way to get answers to my questions.




you

Powering the future… thanks to your neighbor’s renewable energy

Distributed Energy Resources (DER), such as residential solar panels, are not only changing the way energy systems operate, they also present an opportunity to change the way local communities operate by giving consumers the ability to sell excess energy, generated by microgrids or renewable set-ups, to their neighbors – it’s the new energy paradigm.




you

Companies explore how to make your home smart and 100% renewable-powered

Big Oil wants to put a box in your hall closet that works like a human brain, can cut the lights, stop the refrigerator and will know how you move about in the privacy of your home better than you do.




you

It’s clean, powerful and available: Are you ready for hydrogen energy?

As the world responds to the challenges of climate change, energy systems are evolving, and evolving fast. The past 10 years have seen the rise (and dramatic cost reduction) of renewable energy such as wind and solar, to the extent that they are no longer considered alternative energy. They have become mainstream energy sources. Now, what will be the “next big thing” as the world shifts to a low carbon future?




you

Are you a global power & energy elite? Nominations are now open!

“Recognizing leaders in the power and energy industry not only gives us the opportunity to celebrate them and the projects that they are involved in, it also enables us to learn vital business and life lessons from these often exceptional individuals. We find out what makes them tick, what frustrates them and the processes they follow to address challenges – this is often inspiring, eye-opening stuff and cannot but contribute to the growth of the sector.“