Security

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices

With a deep understanding of an organization and how the individuals within it interact with their inbox, AI can determine for every email whether it is suspicious and should be actioned or if it is legitimate and should remain untouched

If crime doesn’t pay, some cybercriminals wouldn’t know it. A top team member in a cybercrime outfit like Conti can make an estimated US$1.1 million a year, according to a report released Monday by Trend Micro. Since cybercrime groups don’t file reports with the SEC, the salary ear...

At its Amplify Partner Conference 2023 in Chicago, HP unveiled several new laptops with a focus on productivity, along with new peripherals, including printers and genuinely wireless headphones

Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services

As generative AI and other future forms of AI advance into cybersecurity, we will finally have the opportunity to mitigate the one security problem that continues to bite us in the butt: ourselves

Dubbed pet tech, pet industry developers use the technology to improve the health, well-being, and overall quality of pets' lives. Apparently, they also use it as a source of data acquisition that puts users' security at risk

Tax fraud schemes in 2022 netted scammers $5.7 billion, more than twice the amount of the previous year, according to the Internal Revenue Service, and there doesn’t appear to be any letup in sight

AU10TIX is working with Microsoft on Reusable ID, a technology that uses verifiable credentials to enable enterprises to simplify and accelerate ongoing ID verification, reduce customer onboarding costs, automate workflows, and enhance the security of sensitive data.

It is time to tackle the growing problem of removing your personal data from uncontrolled online displays, and there are solutions within your grasp. Protect your identity, reputation, and assets with these strategies to delete your data from public record websites and other online dens of inequity

Companies that established open-source program offices over the last few years now need more C-suite oversight to drive education, awareness, and use of open-source software. That sets the stage for an expanded role of open-source program officers

SPECIAL REPORT

Waging War on the Sextortion Epidemic

Digital Forensics Corporation is waging war to protect and educate the public about a rapidly growing trend in cybercrime dubbed sextortion, where online predators target teens and young adults with threats to expose sensitive personal photos

To help companies prepare for the changing nation-state attack landscape, Forrester has a new model to defend themselves and prepare for an expected onslaught of regulations to follow

The new policy urges more mandates on the firms that control most of the nation's digital infrastructure. It also preaches an expanded government role to disrupt hackers and state-sponsored entities

Technewsworld Channels