More stories

  • in

    Multi-factor authentication: How to enable 2FA and boost your security

    <!–> Diki Prayogo/Getty Images You are one data breach away from having your entire online life turned upside down. The problem is passwords, which are hopelessly fragile ways to secure valuable resources. Special Feature Don’t be lulled into a false sense of security by the belief that creating a longer, more complex, harder-to-guess password will […] More

  • in

    Equinix’s data center system upgrade results in hours-long disruption at banks

    <!–> IR_Stone/Getty Images Equinix has confirmed that a scheduled system upgrade at one of its data centers in Singapore affected the operations of several customers, including two banks.  It led to hours-long disruptions that left ATM and online banking services unavailable over the weekend.  Also: Asian banks are a favorite target of cybercooks, and malicious […] More

  • in

    Singapore and US sync up on AI governance and set up joint group

    <!–> Andriy Onufriyenko/Getty Images Singapore and the US have synced up their respective artificial intelligence (AI) frameworks to ease compliance and will continue to work together to drive “safe, trustworthy, and responsible” AI innovation.  Singapore’s Infocomm Media Development Authority (IMDA) and the US National Institute of Standards and Technology (NIST) completed the joint mapping exercise […] More

  • in

    What is the dark web? Here’s everything to know before you access it

    When the dark web is mentioned online, it is usually in tandem with criminal marketplaces and arrests made by law enforcement agencies. Drugs, weapons, and stolen IP and data are all hot businesses on the dark web, with terabytes of information on offer. Traders cash in on stolen credit card data dumps, initial access points to vulnerable systems, credentials, and intellectual property belonging to companies compromised during cyberattacks.However, the dark web has far more uses for organizations and individuals than what a small subset of criminals do under its umbrella.Also: The cheapest VPNs (that won’t slow down your connection)To access a dark web address, you must use a VPN and a suitable browser (it should be Tor). The aim is to reduce your online footprint as much as possible, anonymize your traffic, and disguise your location. There are many legitimate uses for dark web services and communication. For example, this can include tools hosted for combating censorship — critical services for individuals in countries with stringent government surveillance and control, as well as privacy-enhancing anonymous email and whistleblower drop boxes.Some media outlets also maintain an online presence via the dark web when their surface websites are blocked, and other websites do the same when they are banned at the ISP level by countries during periods of unrest. Also: How to use Tor browser (and why you should)Yes, the dark web has an unsavory reputation. However, remaining anonymous can be invaluable to protesters, civil rights groups, journalists, lawyers, and other vulnerable groups. Illegal marketplaces are merely a small fraction of what’s actually there. More

  • in

    6 simple cybersecurity rules you can apply now

    <!–> We Are/Getty Images If you’re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you’re a human being without a technical background, the average Windows error message might as well be written in Klingon. For that latter audience, computer security often devolves into magical thinking. That’s unfortunate […] More

  • in

    How to lock down your Microsoft account and guard it from attackers

    <!–> Gorgaiphotography/Getty Images What’s your most valuable online account, the one most deserving of protection? If you have a personal Microsoft account, that account should be among those you guard most jealously. That’s especially true if you use that account and its associated email address to sign in to one or more Windows PCs or […] More