Patching our children

Today the UK Council on Child Internet Safety [UKCCIS] is launching its Child Internet Safety Strategy. The strategy is designed to encourage children not to disclose personal information, to block unwanted messages on social networks and to report inappropriate behaviour.

As part of the strategy, Internet safety will be made a compulsory part of the National Curriculum for children aged five upwards. There will also be a new digital code for Internet safety.

UKCCIS is also launching its ‘Click Clever, Click Safe’ public awareness campaign.

It’s good to see government lending some weight to education of young people. Cybercriminals so often try to exploit human weaknesses. And I believe that finding ways to ‘patch’ our human resources is every bit as important as securing our computing devices. Education isn’t a quick fix. It’s a bit like housework – we know it’s essential if we want to live comfortably, and we know that it has to be done regularly. And exactly the same goes for education throughout our lives.

Patching our children

Your email address will not be published. Required fields are marked *



The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox