AI, Cybersafety / Cybersecurity / Privacy
1Password Blog – 4.3.24
Here’s the backdrop, and it should be familiar by now: Work has, slowly and then all of a sudden, expanded. No longer confined to the office ecosystem, work happens in coffee shops and at home and at the airport, on company-provided laptops and the shared computer in the living room, on the family iPad and the phones in our pockets.
Source: 1Password cybersecurity report: Balancing information security and productivity in the age of AI | 1Password Blog
Cybersafety / Cybersecurity / Privacy
Avast Blog – 4.3.24
Today’s most common crime is not burglary, car theft or even shoplifting – it’s online fraud. And this includes pitfalls such as emotional scamming. Not to mention, anyone with an internet connection (in other words, all your customers) is a potential victim. So what do you need to know, and how can you advise your customers, to help keep them safe online from this particular kind of scam?
Source: “When can we be together – forever?” A deep dive into emotional scamming
Cybersafety / Cybersecurity / Privacy
NordVPN Blog – 4.3.24
Imagine paying a hacker to break into your servers. Sounds bananas? But if the hacker doesn’t use any of the stolen data and gives you feedback about your system vulnerabilities instead, it doesn’t sound bananas anymore. In fact, one of the best things companies can do to improve their security is to employ these white hat hackers to run penetration tests on their systems
Source: What is penetration testing? Pen testing explained
Cybersafety / Cybersecurity / Privacy
NordVPN Blog – 3.29.24
Publicly accessible USB charging ports are convenient but, unfortunately, not 100% secure. A USB data blocker is a device designed to protect phones, tablets, and laptops from being infected with malware from public USB ports. Find out why having such a device in your pocket is a good idea.
Source: USB data blocker: Why do you need one?
Cybersafety / Cybersecurity / Privacy
Acronis Blog – 3.29.24
As cyberthreats grow in complexity and sophistication, the role of threat hunting has become increasingly crucial, and organizations are turning to advanced solutions to fortify their defenses. Endpoint detection and response (EDR) and extended detection and response (XDR) with threat hunting capabilities are at the forefront of this defense evolution.
Source: Revolutionizing threat hunting for MSPs with Acronis Advanced Security + EDR
Cybersafety / Cybersecurity / Privacy
Kaspersky Blog – 3.29.24
In mid-March, researchers from several U.S. universities published a paper demonstrating a hardware vulnerability in Apple’s “M” series CPUs. These CPUs, based on the ARM architecture and designed by Apple, power most of its newer laptops and desktops, as well as some iPad models. The issue could potentially be exploited to break encryption algorithms. The attack that uses this vulnerability was dubbed “GoFetch”.
Source: GoFetch: Apple CPU encryption hack