Understanding Passkeys and why they are so important for your digital security… Story on PCMag
Month: December 2023
Top cybersecurity threats for 2023
The rise and rapid adoption of new innovative technologies, such as generative artificial intelligence, no-code apps, automation and the Internet of Things, have led to a great many security compromises… Story on TechRepublic
How to Protect Your Data Online: Minimize, Monitor, and Manage
5 Basic habits for protecting your digital assets… Story on PCMag
Are Password Managers Safe to Use? (Benefits, Risks and Best Practices)
Yes. Password managers are a safer way to manage and secure passwords than any other approach. They may not be perfect, but what are the alternatives? Story on TechRepublic
BlackCat/ALPHV Ransomware Site Seized in International Takedown Effort
On Dec. 19, the Department of Justice announced the FBI had been working on a disruption campaign against the ransomware group known as… Story on TechRepublic
iOS 17.2 Finally Prevents Those Annoying Flipper Zero Attacks
Apple has finally protected iOS devices from Flipper Zero basic attacks Story on PCMag
Watch Out: How to Stop Your Smart TV From Spying on You
Smart televisions offer many cool features, including internet access, streaming apps, and built-in cameras and microphones. However, because they are always on they represent a constant threat… Story on PCMag
Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware
A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557… Story on TechRepublic
I fact-checked ChatGPT with Bard, Claude, and Copilot – and this AI was the most confidently incorrect
Generative artificial intelligence (AI) is notoriously prone to factual errors . So, what do you do when you’ve asked ChatGPT… Story on ZDNet
Top 12 Firewall Best Practices to Optimize Network Security
Some help for determining Best Practices with Firewalls Story on eSecurity Planet