News

  • Make a Hacker’s Job Harder with Two-step Verification

    PRIVACY PRIVACY Every day, life for many consumers has become more “digital” than before—this has made day-to-day tasks easier for many of us, but it also creates new challenges. From online banking to medical records, protecting our private, personal information is imperative. Too often, the same password is used for multiple online accounts—for instance, you…

    Read More

  • Microsoft’s Bing AI Faces Malware Threat From Deceptive Ads

    PRIVACY PRIVACY Malwarebytes said the goal of these tactics is to lure victims into downloading malicious software Read More

    Read More

  • Phishing, Smishing Surge Targets US Postal Service

    PRIVACY PRIVACY The surge in these attacks has prompted DomainTools to delve into their origins and implications Read More

    Read More

  • Three men found guilty of laundering $2.5 million in Target gift card tech support scam

    PRIVACY PRIVACY Three Californian residents have been convicted of laundering millions of dollars tricked out of older adults who had fallen victim to government-imposter and tech support scams. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Why Should You be Careful When Using Hotspots or Free Wi-Fi?

    PRIVACY PRIVACY With the digital lifestyle becoming more prevalent, Wi-Fi connections have become a necessity in our day-to-day lives. We frequently connect our devices to available Wi-Fi at various locations such as hotels, restaurants, cafes, and airports. The ability to be connected anywhere, anytime is extraordinary, but it also presents a significant security concern. Unsecured…

    Read More

  • 123456 Is Not an Acceptable Password

    PRIVACY PRIVACY In today’s digital world, the importance of creating and maintaining secure and complex passwords cannot be overstated. A common misconception is that a password only needs to be memorable. Whilst this is a helpful trait, it does a disservice to the importance of having a secure series of characters. This guide will walk…

    Read More

  • ZeroFont trick makes users think that message has been scanned for threats

    PRIVACY PRIVACY Attackers are using the “ZeroFont” technique to manipulate the preview of a message to suggest it had already been scanned for threats. Read more in my article in the Tripwire State of Security blog. Read More

    Read More

  • Building edge computing for manufacturing – the video

    PRIVACY PRIVACY Enjoy this video of Chuck Harold interviewing Theresa Lanowitz, Head of Cybersecurity Evangelism at AT&T Business. It’s lighthearted and enjoyable to watch. The video dives into the manufacturing vertical and how they see the journey to the edge differently than other industries. Download the AT&T Cybersecurity Insights Report: Focus on Manufacturing full report to…

    Read More

  • Privacy Regulator Orders End to Spreadsheet FOI Responses

    PRIVACY PRIVACY UK ICO issues call after damaging police leak Read More

    Read More

  • Microsoft Breach Exposed 60,000 State Department Emails

    PRIVACY PRIVACY Chinese actor Storm-0558 compromised Outlook accounts Read More

    Read More

News, Advisories and much more

Exit mobile version