News

  • Dumb Password Rules

    PRIVACY PRIVACY Troy Hunt is collecting examples of dumb password rules. There are some pretty bad disasters out there. My worst experiences are with sites that have artificial complexity requirements that cause my personal password-generation systems to fail. Some of the systems on the list are even worse: when they fail they don’t tell you…

    Read More

  • Microsoft Intune Suite consolidates endpoint management and protection

    PRIVACY PRIVACY Intune Suite will streamline endpoint management with added features for controlled and secure access. Read More

    Read More

  • 8 Common Cybersecurity issues when purchasing real estate online: and how to handle them

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  More and more, people are completing the entire real estate transaction process online. From searching for properties to signing documents, online…

    Read More

  • Unpatched old vulnerabilities continue to be exploited: Report

    PRIVACY PRIVACY Known vulnerabilities as old as 2017 are still being successfully exploited in wide-ranging attacks as organizations fail to patch or remediate them successfully, according to a new report by Tenable.  The report is based on Tenable Research team’s analysis of cybersecurity events, vulnerabilities and trends throughout 2022, including an analysis of 1,335 data…

    Read More

  • Russian Government Bans Foreign Messaging Apps

    PRIVACY PRIVACY Kremlin hunkers down as war enters its second year Read More

    Read More

  • ICO Calls for Review into Private Message Use by Ministers

    PRIVACY PRIVACY Regulator says Hancock saga highlights dangers of using WhatsApp Read More

    Read More

  • Best and worst data breach responses highlight the do’s and don’ts of IR

    PRIVACY PRIVACY In theory, enterprises should not only have security measures in place to prevent a data breach but should also have detailed plans for a response in the event of a breach. And they should periodically conduct drills to test those plans. Industry-wide best practices for incident response are well established. “In general, you…

    Read More

  • Major Phishing Campaign Targets Trezor Crypto Wallets

    PRIVACY PRIVACY Users bombarded with fake emails, texts and calls Read More

    Read More

  • Malware: 5 Tips for Fighting the Malicious Software

    PRIVACY PRIVACY Malware—the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our lives. From an entire attack campaign on banks worldwide, to a strain residing within medical devices, to a variant that has learned to self-heal,…

    Read More

  • Smashing Security podcast #311: TikTok, wiretapping, and your deepfake voice is your password

    PRIVACY PRIVACY Who has been warning Italian criminals that their phones are wiretapped? Can you trust your voice to protect your bank account? And why is TikTok being singled out by investigators? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley…

    Read More

News, Advisories and much more

Exit mobile version