More stories

  • in

    How to check the Privacy Report for website tracking in Safari

    Shutterstock Quick… how rampant are trackers on the sites you visit? Do you know? Do you care to know? If you use the Safari browser on MacOS, you have everything you need to view that information built right into the browser. The tool in question is called the Privacy Report, and it’s easy to access […] More

  • in

    Caught up in another password breach? Follow these 3 rules to protect yourself online

    Another day, another password breach. This time, the compromised website belongs to the Plex media-streaming service, and the advice is predictable: Reset your account password immediately.Yes, of course you should do that. But don’t stop there. Every one of these incidents is an opportunity to assess your current online security and tighten it up as needed. The goal is to make sure you’re at minimal risk when (not if) another, similar data breach occurs. The best way to do that is to follow three ironclad rules:Always use a long, random passwordNever reuse a passwordAlways turn on 2-factor authentication (2FA), if possibleIf you followed those rules, you wouldn’t have been particularly worried about today’s password breach. Why? The hash of that long, random password can’t easily be matched with its plaintext version, and even if the thieves managed to decrypt that password and try to use it before you changed it, they’d be stopped cold by the 2FA prompt.ZDNET recommends Most importantly, if they tried those credentials on other sites, they’d have no success at all. The real danger of reusing passwords is that simply changing them in one place isn’t enough. If you use the same password on multiple websites, you could be in a heap of trouble once the bad guys start trying the stolen Plex password on popular sites like Gmail and Outlook.com.The good news is that a first-rate password manager can help you identify weak passwords and detect duplicates. Here’s one example, a report generated by 1Password More

  • in

    Hackers are attempting to steal millions of dollars from businesses by bypassing multi-factor authentication

    Image: Getty A phishing and business email compromise (BEC) campaign that attempts to steal millions of dollars from victims is targeting Microsoft 365 accounts with attacks that can bypass multi-factor authentication (MFA).  Applying multi-factor authentication (MFA) is one of the best things that can be done to help secure user accounts from being compromised – […] More

  • in

    Microsoft: Russian hackers gain powerful 'MagicWeb' authentication bypass

    Image: Getty Microsoft has warned that the hacking group behind the 2020 SolarWinds supply chain attack have a new technique for bypassing authentication in corporate networks. The trick, a highly specialized capability Microsoft calls “MagicWeb”, allows the actors to keep a firm position in a network even as defenders attempt to eject them. However, unlike […] More

  • in

    SpaceX and T-Mobile to reveal plan to boost US connectivity

    Image: Sundry Photography/Shutterstock SpaceX and US mobile carrier T-Mobile have teased an announcement, to be shared today, that they claim will “increase connectivity”.  The two companies, along with SpaceX CEO Elon Musk, announced the surprise event via their respective Twitter accounts. It will be held at 7:00pm CT today at SpaceX’s Starbase spaceport in Texas […] More

  • in

    Check out Lincoln's eye-popping take on the self-driving car

    Lincoln Lincoln’s new autonomous car concept offers a lot to gawk at. One thing it doesn’t offer: A steering wheel. The automaker unveiled its newest creation in honor of its 100th birthday. The concept car, which is a computer generated model at the moment, is meant to pay homage to the Model L, the brand’s […] More

  • in

    Peiter 'Mudge' Zatko: CSO-turned-whistleblower says Twitter security was in a shambles

    Image: Getty The former chief of security at Twitter has filed a whistleblower testimony that its physical and digital security systems for protecting user privacy and moderating content suffered extreme deficiencies.  Peiter ‘Mudge’ Zatko was hired as Twitter’s chief security officer by company co-founder Jack Dorsey in November 2020, but was terminated in January 2022 […] More

  • in

    Plex breached: Change your passwords now

    Image: Plex Plex started life as a fork of the open source XBMC (XBox Media Center) project, now known as Kodi. Back in the day, XBMC put a lean-back UI on top of a wide range of media playback codecs, allowing users to watch stored movies and videos on their TVs and computer screens. Over […] More