News

  • The Dark Web: A Definitive Guide

    PRIVACY PRIVACY The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay your bills, schedule your next family vacation, and order groceries with the click of a button. While the internet offers many positive benefits, it also has some negatives. Although not entirely used for…

    Read More

  • What to Do If Your Identity Has Been Stolen

    PRIVACY PRIVACY We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily activities, like buying groceries or paying bills. While it’s convenient to connect with people and complete tasks online, cybercriminals are eager to use the internet to steal…

    Read More

  • ‘Wormable’ Flaw Leads January 2022 Patch Tuesday

    PRIVACY PRIVACY Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is “wormable,”…

    Read More

  • Apple’s Private Relay Is Being Blocked

    PRIVACY PRIVACY Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot thread. Read More

    Read More

  • Hacking group accidentally infects itself with Remote Access Trojan horse

    PRIVACY PRIVACY Patchwork, an Indian hacking group also known by such bizarre names as Hangover Group, Dropping Elephant, Chinastrats, and Monsoon, has proven the old adage that to err is human, but to really cock things up you need to be a cybercriminal. Read More

    Read More

  • Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

    PRIVACY PRIVACY Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation.…

    Read More

  • Protecting Your Privacy This Year

    PRIVACY PRIVACY If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal identities are worth looking out for. We have your back. And here’s why.  In the U.S., reported cases of identity theft continue to rise. Comparing the first three quarters of 2020 to…

    Read More

  • Free guide: “A Journey to Zero Trust With Zero Passwords”

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide by the analysts at The Cyber Hut looks at how Zero Trust increases business agility and provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy.…

    Read More

  • Multi-Factor is incomplete without backup codes

    PRIVACY PRIVACY This blog was written by an independent guest blogger. I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process.  Anyone who knows me, knows that I have been a…

    Read More

  • 500M Avira Antivirus Users Introduced to Cryptomining

    PRIVACY PRIVACY Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the…

    Read More

News, Advisories and much more

Exit mobile version