More stories

  • in

    Rely on Authy desktop apps? You have one month to switch your 2FA, or else

    <!–> Westend61/Getty Images Like many others, I have been a long-time user of Twilio’s Authy Desktop app, a part of the company’s range of Authy two-factor authenticator (2FA) apps for various platforms. I started using it because it allowed me access to my authentication keys on virtually any device. Also: Multi-factor authentication: How to enable […] More

  • in

    DuckDuckGo’s encrypted syncing brings private browsing to all your devices

    Maria Diaz/ZDNET Privacy-conscious users have yet another reason to ditch Chrome. DuckDuckGo users now can sync their browser bookmarks and passwords securely across multiple devices – all without an account. In the new Sync & Backup feature, data is encrypted locally on the user’s device, with end-to-end encryption applied to the sync process. If you’re wondering […] More

  • in

    Don’t tell your AI anything personal, Google warns in new Gemini privacy notice

    Maria Diaz/ZDNET The Gemini app, formerly known as Bard, is poised to become the next-generation digital assistant on Android devices. This new AI-centric landscape promises to make interacting with your smartphones and other devices considerably smarter and easier. But those AI apps come with a risk, which Google’s new privacy warning illustrates perfectly. Also: The […] More

  • in

    5 reasons why I use Firefox when I need the most secure web browser

    <!–> Anadolu/Contributor/Getty Images I’ve been using Firefox for a very long time. Although it’s not currently set as my default web browser, whenever I need to do something that requires heightened security (such as sending banking or viewing sensitive information), I always turn to the open-source web browser. This is not to say that other […] More

  • in

    Secure a reliable cyber security education for $46

    <!–> Save 65% on these cyber security courses. StackSocial Cyber security is something that is needed by virtually everybody in today’s society. Whether you’re a business leader who is looking for ways to improve protection while keeping costs manageable, an aspiring IT professional or specialist, or an everyday person, brushing up on cyber security can […] More

  • in

    I tested iOS 17.3.1: What’s inside, who needs it, and how it affected my iPhone

    <!–> Jaap Arriens/NurPhoto via Getty Images While we’ve been patiently waiting for Apple to release iOS 17.4, the company surprised us by launching an unexpected update for the iPhone: iOS 17.3.1, alongside iPadOS 17.3.1. So, what does this update include? Is it necessary? And importantly, could it potentially cause issues for your iPhone? Also: 7 hacking […] More

  • in

    This botched migration shows why you need to deal with legacy tech

    <!–> aire images/Getty Images While working on a piece about the talent crunch in cybersecurity, I was a tad surprised when legacy systems popped up as a common challenge that IT administrators struggle with today.  I expected organizations would have figured out by now that IT sprawl is costly and their adoption of new technology […] More

  • in

    Shim vulnerability exposes most Linux systems to attack

    <!–> Andrew Brookes/Getty Images Another day, another potential Linux security problem. This time around, it’s a critical vulnerability in shim – the key link between Linux and your computer’s firmware during boot. Left unrepaired, a network attacker could bypass secure boot and take control of your system. First things first: The shim in question is […] More