7 steps to staying safe and secure on Twitter

7 steps to staying safe and secure on Twitter

Follow these easy steps to prevent your Twitter account from being hacked and to remain safe while tweeting Twitter, the popular social networking service, will celebrate its 15th anniversary this Sunday. Perhaps it’s not a stretch to say that it has been a monumental force in the lives of some of us. It’s also during…
5 reasons why (not only) financial companies struggle with cybersecurity

5 reasons why (not only) financial companies struggle with cybersecurity

Why do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks? Financial services companies have been a popular target for cybercriminals for a long time. Not without good reason, since beyond working with money, financial companies handle a slew of sensitive client data that criminals utilize…
When repairing things you own may make you an outlaw

When repairing things you own may make you an outlaw

How do you balance the right to repair with the requirement to remain secure? Images of jackbooted, militarized cops descending into dimly-lit basements where appliance techs slap grimy, roughshod parts of doubtful lineage together come to mind in the still-simmering fight – yes, it’s a fight – to allow people to work on the tech…
Almost  billion lost to BEC scams in 2020

Almost $2 billion lost to BEC scams in 2020

Nearly half of reported cybercrime losses in 2020 were the result of BEC fraud, according to an FBI report Losses emanating from Business Email Compromise (BEC) and Email Account Compromise (EAC) scams surpassed US$1.86 billion last year, which is more than the combined losses stemming from the next six costliest types of cybercrime in the 2020…
PayPal fraud: What merchants should know

PayPal fraud: What merchants should know

From overpayment to shipping scams, what are some of the most common threats that merchants using PayPal should watch out for? With a total payment volume of US$247 billion, PayPal remains one of the more popular online payment providers among major brands and a variety of smaller businesses and vendors. Indeed, the payment giant boasts…
Google fixes Chrome zero‑day bug exploited in the wild

Google fixes Chrome zero‑day bug exploited in the wild

The latest update patches a total of five vulnerabilities affecting the browser’s desktop versions Google has rolled out an update for its Chrome web browser that fixes five security flaws, including a zero-day vulnerability that is known to be actively exploited by malicious actors. The bugs affect the Windows, macOS, and Linux versions of the…
Beware Android trojan posing as Clubhouse app

Beware Android trojan posing as Clubhouse app

The malware can grab login credentials for more than 450 apps and bypass SMS-based two-factor authentication Cybercriminals are attempting to take advantage of the popularity of Clubhouse to deliver malware that aims to steal users’ login information for a variety of online services, ESET malware researcher Lukas Stefanko has found. Disguised as the (as yet…
Women in cybersecurity: Gender gap narrows but not enough

Women in cybersecurity: Gender gap narrows but not enough

The number of women joining the ranks of cybersecurity practitioners is steadily increasing, but a lot still needs to be done to close the gap The race to even-up the gender disparity in many industries is steadily gathering steam – and for all the right reasons. A diverse workforce offers a more level playing field…
WhatsApp may soon roll out encrypted chat backups

WhatsApp may soon roll out encrypted chat backups

While chats are end-to-end encrypted, their backups are not – this may change soon WhatsApp is said to be working to add encryption for chat backups that will allow users to easily secure their conversations when storing them in the cloud. While the company does currently offer end-to-end encryption for messages, calls and other forms…
Online health security – when ‘opt out’ isn’t an option

Online health security – when ‘opt out’ isn’t an option

What happens when you try to opt out of e-health to avoid issues in the event of a breach? Healthcare hacks are particularly insidious. When hackers get the data, they hack you – or at least the closest facsimile there is of you. And unless you lie on your health records (and even then, there…