Category: Viral
Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information Source link lol
Read MoreAs we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that befell various organizations this year Source link lol
Read MoreTyping with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. Source link lol
Read MoreHow To Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy 04 Jan 2024 • , 6 min. read Ever had that brief moment of worry when you reach…
Read MoreVideo What are some of the key cybersecurity trends that people and organizations should have on their radars this year? 05 Jan 2024 As 2024 dawns, it’s time to look ahead to the challenges that are set to face people and organizations across the world this year. In this week’s video, ESET Chief Security Evangelist…
Read MoreSteeped in AI and the security risks of its use, the 2023 SANS Holiday Hack Challenge was an enrichening experience of navigating a series of 21 objectives that tested and broadened multiple cybersecurity skills. The best challenges for me were hunting down AI hallucinations in a pentest report, escalating privileges on a Linux system, searching…
Read MoreWe Live Progress Is AI companionship the future of not-so-human connection – and even the cure for loneliness? 09 Jan 2024 • , 7 min. read Modern technology permeates almost every facet of our lives, shaping our day-to-day in ways both subtle and obvious – and indeed in ways we probably never anticipated. Just imagine…
Read MoreMobile Security WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride. 10 Jan 2024 • , 5 min. read Mobile applications make the world go round. Instant communication services are among the most popular apps on iOS and Android alike – US non-profit operation…
Read MoreBusiness Security How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks 11 Jan 2024 • , 4 min. read In the untold expanse of online information and communication, the ability to find the signal in the noise and discern the authenticity of data and its…
Read MoreVideo The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC’s X account right ahead of the much-anticipated decision about Bitcoin ETFs 12 Jan 2024 The US Securities and Exchange Commission’s (SEC) X account was hacked this week to post an unauthorized tweet…
Read MoreRecent Posts
- Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks
- Threat actors exploit zero-days faster than ever – Week in security with Tony Anscombe
- Multiple Vulnerabilities in Palo Alto Network’s Expedition Could Allow for Arbitrary Code Execution
- Oracle Quarterly Critical Patches Issued October 15, 2024
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution