More stories

  • in

    Microsoft: Raspberry Robin USB worm hits nearly 1,000 organizations in the past month

    Image: M-A-U / Getty Images Microsoft is warning that the relatively new Raspberry Robin USB drive worm has triggered payload alerts on nearly 3,000 devices in almost 1,000 organizations in the past 30 days.  Raspberry Robin malware has previously been seen installed with FakeUpdates malware, which has been linked to the Russian cyber-crime group EvilCorp. […] More

  • in

    OpenSSL warns of critical security vulnerability with upcoming patch

    Everyone depends on OpenSSL. You may not know it, but OpenSSL is what makes it possible to use secure Transport Layer Security (TLS) on Linux, Unix, Windows, and many other operating systems. It’s also what is used to lock down pretty much every secure communications and networking application and device out there.  So we should […] More

  • in

    Winkeo-C FIDO2, hands on: A reliable and affordable USB-C security key

    Pros Good price FIDO2 and FIDO U2F support Cons Some setup required No NFC or biometric optionsMany devices now use biometrics to let you log in without the inconvenience of remembering and typing a password: it’s more secure, but it usually adds a little to the price of the device. If you use any devices that don’t have Windows Hello, Face ID or a fingerprint sensor then you must have a password on your account anyway.   If you want to use two-factor authentication (2FA) or even go full passwordless but you still have older devices with no biometric hardware (or you prefer not to use biometrics), a FIDO2 hardware key will let you use the same cross-platform authentication that’s built into Windows, MacOS, iOS, Android, ChromeOS, Linux (although you may need to do a little more setup) and an increasing number of online services like Microsoft 365, Azure AD, Google Drive and more.  More

  • in

    These cybersecurity vulnerabilities are most popular with hackers right now – have you patched them?

    Image: Getty/Manuel Breva Colmeiro One of the most popular security vulnerabilities among cyber criminals during the past few months is a software flaw in Microsoft Office that’s over five years old – and it continues to be exploited because, despite a longstanding available security update, many businesses still haven’t applied it.  According to analysis by […] More

  • in

    The 4 best free VPNs for iPhone

    Windscribe free VPN iOS features: Simultaneous Connections: 1 | Kill switch: Yes | Logging: None | Customer service: FAQ, email, bot chat | Data limit: Up to 15GB monthly | Countries: 11 | Server locations: 31The Windscribe VPN iOS app has a good number of features compared to other free iPhone VPNs. You can customize the visual layout and choose from 17 languages. There are also options for adjusting the server display to show the load and latency of each location.Windscribe VPN also has a built-in blocker for ads, trackers, and malware. You can even customize lists of sites or IP addresses you’d like to block using Windscribe’s R.O.B.E.R.T. tool. Where the free Windscribe service really shines is with its server network, which has servers in more countries than any of the other free iPhone VPNs we’ve highlighted. It has 31 free servers across these countries:CanadaFranceGermanyHong KongNetherlandsNorwayRomaniaSwitzerlandTurkeyUnited KingdomUnited StatesWhen you sign up for the free Windscribe VPN you’ll start off with 2GB a month but it’s easy to increase that limit. You can bump up to 10GB a month when you verify your email and get a permanent boost to 15GB monthly if you tweet about the service (and have at least three followers).You can access support through email or possibly get your questions answered with the FAQ guides. There is no live chat option, but I found the chatbot (Garry) to be extremely helpful. It provided specific answers to my questions rather than just giving me a list of links to FAQ guides that may or may not answer the question.  More

  • in

    Does disk encryption slow down your PC?

    If you forget your password, you are indistinguishable from a hostile intruder and you will be treated as such, which means you will be locked out from your encrypted data. Getty Images Disk encryption is absolute magic to most non-mathematicians. And like any complex technology, it leads to uncomfortable questions. Does encrypting a disk make […] More

  • in

    These ransomware victims are making the highest ransom payments

    Image: Getty/Nitat Termmee Victims of ransomware attacks in the manufacturing and production industry are making the biggest ransom payments, with the average ransom demand paid coming in at just over $2 million.  Ransomware is a significant cybersecurity issue that affects every sector. But according to analysis of attacks by cybersecurity company Sophos, ransomware is costing […] More