Scroll through social media and you’ll likely see it: fake profiles, bot spam, phishing links. Most don’t realize that many aren’t bots. Rather, they’re run by a criminal operation in Myanmar, one ...
In the United States, most children spend more awake hours in school than they do at home. It is estimated that kids spend 19% of their time in school — second only behind sleeping. This means school ...
Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox ...
Financial exploitation in the elder population has been on the rise, with financial institutions reporting quadruple the number of such incidences from 2013 to 2017, according to the Consumer ...
As Hawai‘i’s aging population grows, so does the risk of financial exploitation targeting kūpuna. In response, the State Executive Office on Aging has launched an elder abuse awareness campaign, ...
Examples of how attackers carry out mass exploitation campaigns and how to defend against them. We’ve all seen the movies where there’s a dark hooded figure sitting behind a keyboard entering a 3D ...
Technology platforms have become the primary vector through which predators and traffickers exploit victims, and the scope of the problem of child exploitation online is almost unfathomable. John ...
As the world reels from the coronavirus pandemic, this tragedy is spotlighting how wildlife trade and habitat destruction threaten human health. It shows how urgently we need to change our ...
Tourism connects the world. It can also shield those who harm the most vulnerable—unless the sector decides, collectively and consistently, that children’s rights are non-negotiable. Ending sexual ...