-
Dumb Password Rules
PRIVACY PRIVACY Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to fail. Some of the systems on the list are even worse: when they fail they don’t tell you…
-
Microsoft Intune Suite consolidates endpoint management and protection
PRIVACY PRIVACY Intune Suite will streamline endpoint management with added features for controlled and secure access. Read More
-
8 Common Cybersecurity issues when purchasing real estate online: and how to handle them
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. More and more, people are completing the entire real estate transaction process online. From searching for properties to signing documents, online…
-
Unpatched old vulnerabilities continue to be exploited: Report
PRIVACY PRIVACY Known vulnerabilities as old as 2017 are still being successfully exploited in wide-ranging attacks as organizations fail to patch or remediate them successfully, according to a new report by Tenable. The report is based on Tenable Research team’s analysis of cybersecurity events, vulnerabilities and trends throughout 2022, including an analysis of 1,335 data…
-
Russian Government Bans Foreign Messaging Apps
PRIVACY PRIVACY Kremlin hunkers down as war enters its second year Read More
-
ICO Calls for Review into Private Message Use by Ministers
PRIVACY PRIVACY Regulator says Hancock saga highlights dangers of using WhatsApp Read More
-
Best and worst data breach responses highlight the do’s and don’ts of IR
PRIVACY PRIVACY In theory, enterprises should not only have security measures in place to prevent a data breach but should also have detailed plans for a response in the event of a breach. And they should periodically conduct drills to test those plans. Industry-wide best practices for incident response are well established. “In general, you…
-
Major Phishing Campaign Targets Trezor Crypto Wallets
PRIVACY PRIVACY Users bombarded with fake emails, texts and calls Read More
-
Malware: 5 Tips for Fighting the Malicious Software
PRIVACY PRIVACY Malware—the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our lives. From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal,…
-
Smashing Security podcast #311: TikTok, wiretapping, and your deepfake voice is your password
PRIVACY PRIVACY Who has been warning Italian criminals that their phones are wiretapped? Can you trust your voice to protect your bank account? And why is TikTok being singled out by investigators? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley…