-
The Dark Web: A Definitive Guide
PRIVACY PRIVACY The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay your bills, schedule your next family vacation, and order groceries with the click of a button. While the internet offers many positive benefits, it also has some negatives. Although not entirely used for…
-
What to Do If Your Identity Has Been Stolen
PRIVACY PRIVACY We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for daily activities, like buying groceries or paying bills. While it’s convenient to connect with people and complete tasks online, cybercriminals are eager to use the internet to steal…
-
‘Wormable’ Flaw Leads January 2022 Patch Tuesday
PRIVACY PRIVACY Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is “wormable,”…
-
Apple’s Private Relay Is Being Blocked
PRIVACY PRIVACY Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot thread. Read More
-
Hacking group accidentally infects itself with Remote Access Trojan horse
PRIVACY PRIVACY Patchwork, an Indian hacking group also known by such bizarre names as Hangover Group, Dropping Elephant, Chinastrats, and Monsoon, has proven the old adage that to err is human, but to really cock things up you need to be a cybercriminal. Read More
-
Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases
PRIVACY PRIVACY Enterprises know they need defenses integrated into each aspect of their network while not being an inhibitor to innovation. Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation.…
-
Protecting Your Privacy This Year
PRIVACY PRIVACY If there’s a particularly clear picture that’s developed over the past couple of years, it’s that our privacy and our personal identities are worth looking out for. We have your back. And here’s why. In the U.S., reported cases of identity theft continue to rise. Comparing the first three quarters of 2020 to…
-
Free guide: “A Journey to Zero Trust With Zero Passwords”
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide by the analysts at The Cyber Hut looks at how Zero Trust increases business agility and provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy.…
-
Multi-Factor is incomplete without backup codes
PRIVACY PRIVACY This blog was written by an independent guest blogger. I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process. Anyone who knows me, knows that I have been a…
-
500M Avira Antivirus Users Introduced to Cryptomining
PRIVACY PRIVACY Many readers were surprised to learn recently that the popular Norton 360 antivirus suite now ships with a program which lets customers make money mining virtual currency. But Norton 360 isn’t alone in this dubious endeavor: Avira antivirus — which has built a base of 500 million users worldwide largely by making the…