Internet, Privacy, Security, Wireless & Cloud
May 28, 2021
Via: Info WorldA study by Ponemon and IBM indicates that misconfigured cloud servers cause 19% of data breaches. This is an expensive problem with an average cost of half a million dollars per breach. This figure does not consider the potential PR […]
Cybersecurity, Privacy, Security
May 18, 2021
Via: The Hacker NewsIn July 2018, when Guizhou-Cloud Big Data (GCBD) agreed to a deal with state-owned telco China Telecom to move iCloud data belonging to Apple’s China-based users to the latter’s servers, the shift raised concerns that it could make user data […]
Cybersecurity, Privacy, Security
May 14, 2021
Via: The Hacker NewsAs the total number of people working from home has grown dramatically in the last year or two, so has the number of individuals who use all of their own technology for their jobs. If you’re a remote worker who […]
May 13, 2021
Via: The Hacker NewsProtection against insider risks works when the process involves controlling the data transfer channels or examining data sources. One approach involves preventing USB flash drives from being copied or sending them over email. The second one concerns preventing leakage or […]
May 6, 2021
Via: MashableWhen someone asks me about improving their online security, I tell them to enable two-factor authentication (2FA). By introducing another security element besides your password, like a Google Authenticator code, you make it orders of magnitude harder for someone to […]
Computing, Cybersecurity, Data Management, Privacy, Security
April 27, 2021
Via: Info WorldRed Hat announced a new option for its OpenShift container platform at the virtual Red Hat Summit this week called Platform Plus, with a focus on helping customers more easily secure and manage their Kubernetes clusters regardless of which environment […]
April 19, 2021
Via: The Hacker NewsThe concept of “passwordless” authentication has been gaining significant industry and media attention. And for a good reason. Our digital lives are demanding an ever-increasing number of online accounts and services, with security best practices dictating that each requires a […]
March 19, 2021
Via: TechSpotFacebook has openly opposed and criticized Apple’s App Tracking Transparency feature that is expected to fully roll out for iOS this spring. The privacy control will essentially put iPhone users in charge of whether they want to be tracked by […]
March 18, 2021
Via: Phone ArenaFacebook has just announced an improvement in its security features by making hardware security keys compatible with two-factor authentication across iOS and Android devices. Since 2017, hardware security keys on Facebook accounts have only been available for desktops as an […]
Computing, Privacy, Security, Software & Applications
March 18, 2021
Via: The Hacker NewsPrivacy-focused search engine DuckDuckGo called out rival Google for “spying” on users after the search giant updated its flagship app to spell out the exact kinds of information it collects for personalization and marketing purposes. “After months of stalling, Google […]
March 12, 2021
Via: Computer WeeklyMalicious emails are an increasing challenge faced by organisations all over the world. According to research from US telecoms giant Verizon, email was the primary delivery method for 94% of malware in 2019, while statistics from UK-based software firm Egress […]
March 11, 2021
Via: The Hacker NewsPassword security has long been an issue for businesses and their cybersecurity standards. Account passwords are often the weakest link in the overall security posture for many organizations. Many companies have used Microsoft’s default password policies for decades. While these […]
February 15, 2021
Via: The Hacker NewsApple’s upcoming iOS 14.5 update will come with a new feature that will redirect all fraudulent website checks through its own proxy servers as a workaround to preserve user privacy and prevent leaking IP addresses to Google. A built-in security-focused […]
January 27, 2021
Via: TechradarIdentity management has a long history, almost as long as computing itself. The first password was implemented by Fernando Corbato in the early 1960s, and this familiar concept passed into Multics and then Unix. However, passwords are no longer suitable […]
January 25, 2021
Via: Computer WeeklyThe pandemic altered many organisations’ ways of working in 2020, with home working becoming the norm for many. Originally, it seemed to be a short-term measure, causing organisations to rapidly deploy point solutions. However, the longer-term view for 2021 and […]
January 21, 2021
Via: The Hacker NewsA new large-scale phishing campaign targeting global organizations has been found to bypass Microsoft Office 365 Advanced Threat Protection (ATP) and steal credentials belonging to over a thousand corporate employees. The cyber offensive is said to have originated in August […]
Computing, Privacy, Security, Software & Applications
January 20, 2021
Via: TechSpotChrome 88 is here, and with it comes several changes to the world’s most popular browser. One of the new features checks for weak or compromised passwords in the software’s password manager. There are also a couple of minor improvements […]
January 5, 2021
Via: The Hacker NewsA three-year-old attack technique to bypass Google’s audio reCAPTCHA by using its own Speech-to-Text API has been found to still work with 97% accuracy. Researcher Nikolai Tschacher disclosed his findings in a proof-of-concept (PoC) of the attack on January 2. […]
December 18, 2020
Via: The VergeUS Customs and Border Protection has filed for a significant expansion in its authority to conduct facial recognition at airports. On November 19th, the agency submitted a filing to the Federal Register seeking to expand the ongoing biometric exit program, […]
October 15, 2020
Via: Phone ArenaIn its company blog, Zoom has just announced that end-to-end encryption (E2EE) will be given as an option to both paid and free Zoom users starting October 19. The new security feature will be in a “technical preview” state within […]