Security

Defenders of software supply chains have a new attack vector to worry about: machine learning models.

Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices.

Streaming video content from non-mainstream providers might make you an unwitting target of content piracy. If you get a bargain pricing offer, you risk becoming the victim of scammers and hackers, losing personal data, and having your financial assets stolen.

The 2022 edition of Mozilla’s Privacy Not Included buyer’s guide has privacy reviews of more than 75 popular consumer electronics gifts.

Compromised credentials provide an easy way for threat actors to get their hands on valuable data possessed by governments. Phishing attacks on civil servants jumped 30% from 2020 to 2021, with one out of every eight workers exposed to phishing threats during the period.

In the coming year, lawmakers will be paying increased attention to workplace monitoring, and whistleblowers may also be demanding monitoring information to support complaints about labor law violations, according to the predictions put together by 10 Forrester analysts.

Let's explore the unique security dynamic between Ukraine and BlackBerry this week because it should reaffirm BlackBerry as the go-to company for cybersecurity. Then we'll close with my product of the week, my new favorite laptop, the incredibly unique Lenovo ThinkBook Plus Gen 3 dual-screen laptop.

A large-scale phishing attack built on typosquatting is targeting Windows and Android users with malware. The campaign currently underway uses more than 200 typosquatting domains that impersonate 27 brands to trick web surfers into downloading malicious software to their computers and phones.

A recent report highlights the staggering growth of ATO fraud online. In the U.S. alone, around 24 million households have fallen victim to this form of fraud. Social media is one of the driving forces behind the issue, with more than half of all ATOs related to a social media account.

The Trend Micro report cited, as an example, the #EyeMakeup hashtag on Instagram, which has nearly 10 million posts, and #EyeChallenge on TikTok, with more than two billion views, exposing iris patterns good enough to pass iris scanners.

Officials charged Joseph Sullivan with working to hide the data breach from U.S. regulators and the Federal Trade Commission, adding his actions attempted to prevent the hackers from being caught.

In a survey of consumers, the Identity Theft Resource Center found that 85% had their Instagram accounts compromised, while 25% had their Facebook account hijacked.

Cloudflare's Zero Trust SIM is designed to secure every packet of data leaving a mobile device. After it’s installed, the ZT SIM sends network traffic from the device to Cloudflare’s cloud where its Zero Trust security policies can be applied to the data.

Data privacy laws are becoming a major focus worldwide as businesses hasten to meet new compliance obligations. Many organizations involved with international commerce must alter their procedures to comply with new legislation.

Technewsworld Channels