Privacy

Reports involving online sexual extortion of teenage boys reached "shocking" levels during the first six months of this year, according to a newly report by the Internet Watch Foundation (IWF).

Despite the growing disdain for the cumbersome process of creating and entering passwords, the transition toward a future without them is gaining traction at a surprisingly slow pace.

Cyber insurance premiums are soaring as insurers limit what's covered, exposing a gap in cybersecurity financial safety nets, according to a new report.

In its annual Consumer Impact Report, the ITRC noted that 16% of victims seeking support from the organization in 2023 acknowledged they had contemplated suicide after having their identity compromised, a substantial increase compared to 2022, when 10% had such thoughts.

Let's talk about security this week in the context of HP's Quarterly Security Report, and what HP is doing to step up to the problem. Then we'll close with what may be my new favorite phone: the Motorola 2023 Razr foldable phone.

After feeding more than 15.6 million passwords into an AI-powered password cracker, researchers concluded that it is possible to crack 51% of common passwords within a minute.

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices.

Dubbed pet tech, pet industry developers use the technology to improve the health, well-being, and overall quality of pets' lives. Apparently, they also use it as a source of data acquisition that puts users' security at risk.

Tax fraud schemes in 2022 netted scammers $5.7 billion, more than twice the amount of the previous year, according to the Internal Revenue Service, and there doesn’t appear to be any letup in sight.

AU10TIX is working with Microsoft on Reusable ID, a technology that uses verifiable credentials to enable enterprises to simplify and accelerate ongoing ID verification, reduce customer onboarding costs, automate workflows, and enhance the security of sensitive data.

It is time to tackle the growing problem of removing your personal data from uncontrolled online displays, and there are solutions within your grasp. Protect your identity, reputation, and assets with these strategies to delete your data from public record websites and other online dens of inequity.

SPECIAL REPORT

Waging War on the Sextortion Epidemic

Digital Forensics Corporation is waging war to protect and educate the public about a rapidly growing trend in cybercrime dubbed sextortion, where online predators target teens and young adults with threats to expose sensitive personal photos.

Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity.

The law aims to protect Americans by blocking and prohibiting all transactions from any social media company in, or under the influence of, China, Russia, and several other foreign countries of concern.

Technewsworld Channels