Privacy

Quick Response codes have become a vehicle for bad actors to steal credentials, infect mobile devices, and invade corporate systems.

Called Lantern, the initiative allows companies in the coalition to share information about potential child sexual exploitation, which will increase their prevention and detection capabilities, speed up the identification of threats, build situational awareness of new predatory tactics, and strength...

If law enforcement officers can use technology to track people, then people ought to be able to return the favor, according to a robotics hacker who created a service enabling people to monitor police activity using Bluetooth.

Reports involving online sexual extortion of teenage boys reached "shocking" levels during the first six months of this year, according to a newly report by the Internet Watch Foundation (IWF).

Despite the growing disdain for the cumbersome process of creating and entering passwords, the transition toward a future without them is gaining traction at a surprisingly slow pace.

Cyber insurance premiums are soaring as insurers limit what's covered, exposing a gap in cybersecurity financial safety nets, according to a new report.

In its annual Consumer Impact Report, the ITRC noted that 16% of victims seeking support from the organization in 2023 acknowledged they had contemplated suicide after having their identity compromised, a substantial increase compared to 2022, when 10% had such thoughts.

Let's talk about security this week in the context of HP's Quarterly Security Report, and what HP is doing to step up to the problem. Then we'll close with what may be my new favorite phone: the Motorola 2023 Razr foldable phone.

After feeding more than 15.6 million passwords into an AI-powered password cracker, researchers concluded that it is possible to crack 51% of common passwords within a minute.

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices.

Dubbed pet tech, pet industry developers use the technology to improve the health, well-being, and overall quality of pets' lives. Apparently, they also use it as a source of data acquisition that puts users' security at risk.

Tax fraud schemes in 2022 netted scammers $5.7 billion, more than twice the amount of the previous year, according to the Internal Revenue Service, and there doesn’t appear to be any letup in sight.

AU10TIX is working with Microsoft on Reusable ID, a technology that uses verifiable credentials to enable enterprises to simplify and accelerate ongoing ID verification, reduce customer onboarding costs, automate workflows, and enhance the security of sensitive data.

It is time to tackle the growing problem of removing your personal data from uncontrolled online displays, and there are solutions within your grasp. Protect your identity, reputation, and assets with these strategies to delete your data from public record websites and other online dens of inequity.

Technewsworld Channels