Category: Cybersafety / Cybersecurity / Privacy
-
Is Anima AI Safe for Kids?
Gabb Wireless Blog – 8.7.24 AI girlfriends or boyfriends? What could go wrong!? For kids and teens, we suspect a lot of things. Anima is an AI-based platform that allows users to create and chat with an AI friend, or AI boyfriend or girlfriend, as long as the user is willing to pay a monthly fee.…
-
The Evolution of Smartphone Security
Purism Blog – 8.7.24 When smartphones first emerged in the early 2000s, the attack surface was relatively small. Devices were primarily used for Personal Information Management (PIM) such as calls, texts, email, calendaring, and basic internet browsing. Source: The Evolution of Smartphone Security – Purism
-
New LianSpy spyware targets Android smartphones
Kaspersky Blog – 8.5.24 Spyware is a dangerous tool that can be used to selectively monitor specific victims. Often the victims are employees in a single company, or residents in a single country. The new mobile spyware, which we discovered and dubbed LianSpy, targets — for now — users of Android smartphones in Russia, but…
-
How Do I Protect Myself When Using Wi-Fi?
McAfee Blog – 8.2.24 Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, even airplanes. Source: How Do I Protect Myself When Using Wi-Fi?
-
Samsung Announces New Galaxy Tab A9+ Kids Edition, Creating a Safe Environment for Kids Online
Samsung Newsroom – 8.2.24 Samsung Electronics America today announced the U.S. availability of the all-new Galaxy Tab A9+ Kids Edition. In today’s digital age, kids are increasingly exposed to technology starting from a young age, and it’s important that they have the tools needed to engage safely. With Galaxy Tab A9+ Kids Edition, parents can shape a safer…
-
Chase phishing emails: How to spot them
NordVPN Blog – 8.2.24 Chase, a division of JPMorgan Chase, is a popular, well-trusted bank, which makes a Chase phishing email an attractive tactic for cybercriminals. Keep reading to learn more about how to spot and report Chase phishing. Source: Chase phishing emails: How to spot them
-
2024’s Least and most secure authentication methods | 1Password Blog
1Password Blog -8.2.24 Any security professional will tell you there’s a simple way to keep data secure: encase it in concrete and toss it in the ocean. Unfortunately, while that approach will keep hackers out, it’ll also lock out legitimate users. The next best thing is to set up authentication protocols that don’t make access…
-
Introducing Unlock with Google for 1Password Business
1Password Blog – 8.1.24 1Password Business customers can now integrate with Google Identity Platform using OpenID Connect (OIDC). Doing so brings all the benefits of integrating 1Password with your IdP: streamlined access, unified security policies, and improved auditing, compliance, and reporting workflows. Source: Introducing Unlock with Google for 1Password Business | 1Password Blog
-
Coming soon: YubiKey Bio Series – FIDO Edition with new features and enhancements fast-tracks users to passwordless
Yubico Blog – 8.1.24 Following the release of 5.7 firmware on the YubiKey 5 Series and Security Key Series in May, we are excited to announce that YubiKey Bio Series – FIDO Edition keys enhanced with the latest 5.7 firmware are targeted to ship in mid-August. Similar to existing keys with 5.7 updates, YubiKey Bio Series – FIDO Edition…
-
Murphy’s Law and the lessons of the CrowdStrike outage
Acronis Blog – 8/1/24 “Anything that can go wrong will go wrong, and at the worst possible time.” — Edward A. Murphy Jr., American aerospace engineer The CrowdStrike outage of July 19, 2024 has already been covered in a thousand news stories and a hundred memes. The short version: Cybersecurity vendor CrowdStrike issued a minor but flawed…