Between tech support requesting access to your computer, concerned tax services specialists demanding payments, medical equipment suppliers “returning your call,” and many more — none legitimate — it’s a wonder anyone even answers their phone anymore. You’d be hard-pressed to find someone who hasn’t experienced some form of phone scam, although the name for it isn’t as … [Read more...] about What vishing is and how to protect yourself from it
protect
Mozilla Says Google’s New Ad Tech—FLoC—Doesn’t Protect User Privacy
Google's upcoming plans to replace third-party cookies with a less invasive ad targeted mechanism have a number of issues that could defeat its privacy objectives and allow for significant linkability of user behavior, possibly even identifying individual users. "FLoC is premised on a compelling idea: enable ad targeting without exposing users to risk," said Eric Rescorla, … [Read more...] about Mozilla Says Google’s New Ad Tech—FLoC—Doesn’t Protect User Privacy
What smishing is and how to protect yourself from it
With smishing all the rage, media in the United States, Italy, and Brazil have been cranking out alarming stories about new scams. The German police even issued an official warning about one such campaign. The phenomenon has raked in massive sums, as evidenced by its search popularity. So, what is smishing? Rise in search popularity of “smishing” on Google in the past few … [Read more...] about What smishing is and how to protect yourself from it
New Framework Released to Protect Machine Learning Systems From Adversarial Attacks
Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to organize the different techniques employed by malicious adversaries in … [Read more...] about New Framework Released to Protect Machine Learning Systems From Adversarial Attacks
Actionable Indicators to Protect a Remote Workforce
Introduction As the world continues to adjust to the new reality of employees working from anywhere and at any time, security teams are working overtime to protect users from cybercriminals that use novel themes and lures to mount attacks. Organizations are faced with a dilemma: Security teams are expected to be aware of the latest global techniques and campaigns, but with … [Read more...] about Actionable Indicators to Protect a Remote Workforce
4 Tips to Protect your macOS Environments
Over the past year, CrowdStrike® Services has observed threat actors increasingly targeting macOS environments — and using relatively unsophisticated methods to gain access. Even though workplace macOS systems have become increasingly popular, organizations often lack adequate macOS endpoint monitoring and management capabilities, compared to their Windows systems — making Macs … [Read more...] about 4 Tips to Protect your macOS Environments
Threat Intelligence to Protect a Remote Workforce
Introduction Adversaries are preying on the fear and disruption caused by the coronavirus pandemic. Their use of COVID-19-related phishing lures with promises of aid or information is now commonplace. In addition, the rapid pivot of organizations to work-from-home has created opportunities for adversaries to probe for security gaps in the newly deployed infrastructure. How can … [Read more...] about Threat Intelligence to Protect a Remote Workforce
Fleeceware and hidden paid subscriptions: How to protect yourself
Remember how Pulp Fiction hitman Vincent Vega wanted to try a milkshake simply because it cost a whopping $5? That’s a completely normal reaction — many people automatically associate high price with some extraordinary quality. So, if they can sample an expensive product free, even those who don’t plan to buy are interested. Some smartphone app developers take advantage of this … [Read more...] about Fleeceware and hidden paid subscriptions: How to protect yourself
Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers
Are you using Komodo's Agama Wallet to store your KMD and BTC cryptocurrencies?Were your funds also unauthorisedly transferred overnight to a new address?If yes, don't worry, it's probably safe, and if you are lucky, you will get your funds back.Here's what exactly happened…Komodo, a cryptocurrency project and developer of Agama wallet, adopted a surprisingly unique way to … [Read more...] about Cryptocurrency Firm Itself Hacked Its Customers to Protect Their Funds From Hackers
Does the Jet Black iPhone 7 Scratch Easily?
The jet black iPhone 7 is beyond stunning. But how does it fair when it comes to everyday use? … [Read more...] about Does the Jet Black iPhone 7 Scratch Easily?