Cyber criminals continue to target and exploit people

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat actors continue their ceaseless creativity as they exploit the… Continue reading Cyber criminals continue to target and exploit people

Which users are at higher risk of email-based phishing and malware?

The risk of being targeted with email-based phishing and malware attacks is not evenly spread across geographic and demographic boundaries, Google and Stanford University researchers have discovered. Australian users are, for example, at a higher risk … Continue reading Which users are at higher risk of email-based phishing and malware?

Google offers high-risk Chrome users additional scanning of risky files

Google is providing a new “risky files” scanning feature to Chrome users enrolled in its Advanced Protection Program (APP). About the Advanced Protection Program Google introduced the Advanced Protection Program in 2017. It’s primaril… Continue reading Google offers high-risk Chrome users additional scanning of risky files

State-sponsored actors may have abused Twitter API to de-anonymize users

A Twitter API that’s intended to help new account holders find people they may already know on Twitter has been abused by known and unknown actors to tie usernames to phone numbers and potentially de-anonymize certain users. How did it happen? &#… Continue reading State-sponsored actors may have abused Twitter API to de-anonymize users

Could lighting your home open up your personal information to hackers?

Earlier this year Amazon’s Echo made global headlines when it was reported that consumers’ conversations were recorded and heard by thousands of employees. Now researchers at UTSA have conducted a review of the security holes that exist in … Continue reading Could lighting your home open up your personal information to hackers?

Local Admin Passwords: The Hidden Security Risk

You’re a good administrator, and you don’t take shortcuts. You adhere to information security best practices whenever possible, and you take that responsibility seriously.
With that said, a hidden setting in a Windows 10 implementation… Continue reading Local Admin Passwords: The Hidden Security Risk

How to write an effective data breach notification?

Data breach notifications sent by companies to affected customers are often unclear and not very helpful, University of Michigan researchers have found. The problem(s) The researchers have analyzed 161 data breach notifications sent by companies to US … Continue reading How to write an effective data breach notification?

Employees are aware of USB drive security risks, but don’t follow best practices

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by Apricorn. “The State of USB Data Protection 2019: Employee Spotlight” survey report… Continue reading Employees are aware of USB drive security risks, but don’t follow best practices

Users are too confident in their protection from threats

Most users care about online privacy and take some steps to make sure their data is protected, a new Malwarebytes survey has revealed. But some protection measures are too burdensome to implement, which still leaves them open to many common attack aven… Continue reading Users are too confident in their protection from threats