The peace of mind that comes with keeping nosy acquaintances and curious… Story on PCMag
Author: ceadmin
Threat attackers can own your data in just two days
New research from Cybereason exposes how fast cybercriminals can be when it comes to exploit an initial infection… Story on TechRepublic
Hundreds of MSI Motherboards Have a Serious Security Flaw
Someone at MSI screwed up and left hundreds of the company’s motherboards vulnerable to malware… Story on PCMag
Securing the edge begins with securing IoT devices
Keeping endpoint IoT devices is still an uphill battle for many IT departments, and cybercriminals know it. Story on TechRepublic
Can AI detectors save us from ChatGPT? I tried 3 online tools to find out
A series exploring the issues of AI-generated text… Story on ZDNet
Hackers are using this old trick to dodge security protections
Cyber criminals are exploiting an old vulnerability in Intel drivers in an attempt to gain access to networks… Story on ZDNet
US flight delays: Here’s what caused the FAA’s plane-grounding system outage
A Corrupt File Led To the FAA Ground Stoppage from the someone’s-getting-fired dept. Story on ZDNet
Why Analyzing Past Incidents Helps Teams More Than Usual Security Metrics
Accepted metrics for measuring the severity of security incidents, like mean time to repair (MTTR), may not be as reliable as previously thought… Story on Dark Reading
People are already trying to get ChatGPT to write malware
The ChatGPT AI chatbot has created plenty of excitement in the short time it has been available and now it seems it has been enlisted by… Story on ZDNet
5 Easy Habits to Protect Your Data
It’s a new year, the time when many of us pledge to make big changes in our lives. Maybe 2023 is the year… Story on PCMag