Wednesday, September 30, 2020
Home Cybersecurity News

Cybersecurity News

Can I still be hacked with 2FA enabled?

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up. Usernames...

Quantum internet breakthrough could spell death of hacking

The advent of mass working from home has made many people more aware of the security risks of sending sensitive information via the internet....

Digging your own digital grave: how to manage the data you leave behind

Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without our knowledge or consent

People think they’re too smart to fall for phishing scams

People believe they’re less likely than others to fall for phishing scams and, as a result, underestimate their own risk, a new study shows

Tracking robocalls debunks myths and clears up mysteries

The number of robocalls isn’t going up, and answering a robocall doesn’t make you more likely to get additional ones, according to a new study.
- Advertisement -

Most Commented

Can I still be hacked with 2FA enabled?

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up. Usernames...

Quantum internet breakthrough could spell death of hacking

The advent of mass working from home has made many people more aware of the security risks of sending sensitive information via the internet....

Digging your own digital grave: how to manage the data you leave behind

Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without our knowledge or consent

People think they’re too smart to fall for phishing scams

People believe they’re less likely than others to fall for phishing scams and, as a result, underestimate their own risk, a new study shows

Fake COVID-19 testing kits and lockdown puppy scams: How to protect yourself from fraud in a pandemic

Given the known links between natural disasters and fraud, it is unsurprising offenders are using COVID-19 to target potential victims. While there are limited statistics on crime rates during this period, evidence suggests fraud and other online scams have spiked.

Cyberspace is U.S. infrastructure and will require effective government oversight

A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a...

How to hack a homeworker

The global coronavirus pandemic has changed the world of work forever.  With no real warning or preparation, we all became homeworkers, whether we liked it...

Can private browsing really shield you from prying eyes on the web?

Many people look for more privacy when they browse the web by using their browsers in privacy-protecting modes, called “Private Browsing” in Mozilla Firefox,...

Firms embracing open source software are not securing it

The good news: open source software is nearly universal. The bad news: half of source code repositories contain high-risk vulnerabilities, according to a new report released by Synopsys.

Twitter hack was a threat to democracy and society–now what?

In case 2020 wasn’t dystopian enough, hackers on July 15 hijacked the Twitter accounts of former President Barack Obama, presidential hopeful Joe Biden, Elon...

New algorithm protects against deep fakes

The relative ease with which internet users can create deepfakes could further muddy the waters of what is real and fake online, particularly in...

The social media battle of the bots and sock puppets

Social media platforms like Facebook, Twitter and Instagram started out as a way to connect with friends, family and people of interest. But anyone...

Editor Picks

Can I still be hacked with 2FA enabled?

Cybersecurity is like a game of whack-a-mole. As soon as the good guys put a stop to one type of attack, another pops up. Usernames...

Quantum internet breakthrough could spell death of hacking

The advent of mass working from home has made many people more aware of the security risks of sending sensitive information via the internet....

Digging your own digital grave: how to manage the data you leave behind

Throughout our lifetimes we consume, collate, curate, host and produce a staggering quantity of data – some by our own hand, some by others on our behalf, and some without our knowledge or consent