More stories

  • in

    Testing RFID blocking cards: Do they work? Do you need one?

    The Flipper Zero reading the Apple Pay NFC signal from my Apple Watch Ultra. Adrian Kingsley-Hughes/ZDNET RFID is everywhere, even packed into your credit and debit cards, allowing the information to be read in a “contactless” fashion. Concerns that cards could be read covertly have generated a massive industry of security devices designed to block […] More

  • in

    How to protect your Twitter account without SMS two-factor authentication

    Photo by Beata Zawrzel/NurPhoto via Getty Images Twitter will soon be removing the option for text message two-factor authentication to all but those subscribed to Twitter Blue. But fear not, there are other ways to secure your account. Also: Why is Twitter turning millions of accounts into defenseless targets? There are two alternative options available […] More

  • in

    Five easy steps to keep your smartphone safe from hackers

    Image: Getty/MoMo Productions Your smartphone is the key to not just your online life, but increasingly, almost every aspect of your everyday life.  Special Feature You use it for communicating with friends and family, taking photos, sharing posts on social media, browsing the web, accessing your bank account, online shopping, streaming and much more. That’s […] More

  • in

    How to update your iPhone, iPad, and Mac now to fix a critical security vulnerability

    Michael Gariffo/ZDNET Earlier this week Apple pushed out critical updates for iOS, iPadOS, and MacOS that patch an exploit that’s being used right now to attack systems.  The fact that this vulnerability is being used to attack systems means that these updates need to be installed as soon as possible. While Apple products are generally […] More

  • in

    Fraudsters are using machine learning to help write scam emails in different languages

    Image: Getty/BongkarnThanyakij Business Email Compromise (BEC) gangs are making their payment fraud scams even more effective by using translation tools and machine learning to convincingly distribute emails in multiple languages.  BEC attacks are some of the most effective and financially damaging cyber attacks, with the FBI estimating that they have cost businesses a combined total […] More