-
Smartphone Alternatives: Ease Your Way into Your Child’s First Phone
PRIVACY PRIVACY “But everyone else has one.” Those are familiar words to a parent, especially if you’re having the first smartphone conversation with your tween or pre-teen. In their mind, everyone else has a smartphone so they want a one too. But does “everyone” really have one? Well, your child isn’t wrong. Our recent global…
-
Remediant wants to move beyond PAM to secure enterprise networks
PRIVACY PRIVACY Security software provider Remediant wants to move beyond basic privileged access management (PAM) to help CSOs secure enterprise networks. It’s adopting a new approach it calls PAM+, aimed at helping enterprises protecting access to their systems and build on Zero Trust initiatives. Tim Keeler, CTO and co-founder of Remediant, set out the need…
-
Clever Phishing Scam Uses Legitimate PayPal Messages
PRIVACY PRIVACY Brian Krebs is reporting on a clever PayPal phishing scam that uses legitimate PayPal messaging. Basically, the scammers use the PayPal invoicing system to send the email. The email lists a phone number to dispute the charge, which is not PayPal and quickly turns into a request to download and install a remote-access…
-
Over 900K Kubernetes clusters are misconfigured! Is your cluster a target?
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! Kubernetes is an amazing platform for managing containers at scale. However, a recent study found that over 900,000 Kubernetes clusters are vulnerable to attack because they are misconfigured! This means that…
-
Smashing Security podcast #287: Lost in translation, spiders, and slapping tortillas
PRIVACY PRIVACY We’re back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation. All this and much more is discussed in the latest edition of the award-winning “Smashing Security”…
-
Dashlane launches integrated passkey support for password manager with new in-browser passkey solution
PRIVACY PRIVACY Password management vendor Dashlane has announced the introduction of integrated passkey support in its password manager, unveiling an in-browser passkey solution to help tackle the issue of stolen/misused passwords. The launch comes as the “passwordless authentication” era edges closer with tech giants Apple, Google and Microsoft set to bring it to millions of…
-
Pros and cons of cybersecurity automation
PRIVACY PRIVACY Image Source: Pexels This blog was written by an independent guest blogger. Cybersecurity threats are nothing new. Major corporations and small businesses alike are regularly faced with them. However, as technology continues to advance and change, so do those threats. Technological sophistication is important when it comes to providing us with the advancements…
-
Standards Body Publishes Guidelines for IoT Security Testing
PRIVACY PRIVACY Document will help testers create benchmarks for security products Read More
-
Detected Cyber-Threats Surge 52% in 1H 2022
PRIVACY PRIVACY Trend Micro warns of Linux-based ransomware Read More
-
Intro to MongoDB’s queryable encryption
PRIVACY PRIVACY Queryable encryption was the main attraction at MongoDB World 2022, for understandable reasons. It introduces a unique capability to reduce the attack surface for confidential data in several use cases. In particular, data remains encrypted at insert, storage, and query. Both queries and their responses are encrypted over the wire and randomized for…