More stories

  • in

    Apple just released iOS 16.5.1 with security fixes

    Jason Cipriani/ZDNET Apple on Wednesday released a series of software updates for the iPhone, iPad, Mac, and Apple Watch. The updates in the form of iOS 16.5.1, iPadOS 16.5.1, MacOS 13.4.1, and WatchOS 9.5.2 are more than your typical bug fixes and feature updates.  According to Apple’s security update website, today’s updates all fix known […] More

  • in

    These are the most hacked passwords. Is yours on the list?

    <!–> Oscar Wong/Getty Images Cybercriminals use a variety of tactics to try to determine your passwords. And too many people make the effort easier by using weak and simple ones. A new study from Dojo on the most hacked passwords may be able to help you stay safer online by knowing which mistakes to avoid. […] More

  • in

    Get 408 hours of cybersecurity training with this $80 bundle

    <!–> Save on a bundle of cybersecurity courses that can help prepare you for a new career. StackSocial Cybersecurity remains a fast-growing industry with tons of high-paying job opportunities that need to be filled. While the learning curve for many of the skills needed can be steep, it’s not impossible to break into the industry. […] More

  • in

    The US government buys your user data. Here’s what it does with it

    In the ODNI’s report, commercially available information (CAI) is defined as “information that is available commercially to the general public, and as such, is a subset of publicly available information.” This information can include your location, credit history, insurance claims, criminal records, employment history, income ethnicity, purchase history, and personal interests.Also: Cybersecurity 101: Protect your privacy from hackers, spies, and the governmentAlthough apps and websites will disclose that some of this information is not linked to your identity, the report says it’s possible to “deanonymize [anonymous data] and identify individuals, including US persons,” via reverse engineering.Because CAI is available commercially, the information can be acquired from a third-party data broker, typically in exchange for money. The report defines these data brokers as entities maintaining sophisticated databases full of US citizens’ user data.But data brokers also obtain publicly available information, such as voting registration, bankruptcy information, and web-browsing activity, from cookies. Usually, citizens are unaware that this information is public and that data brokers obtain it.Also: How to delete yourself from internet search results and hide your identity onlineData brokers rely on website registration and cookies to track consumers’ online activity and sell the data to advertisers to target consumers with ads. This business practice makes user data a highly valuable commodity. More

  • in

    How to automatically clear the Bitwarden clipboard for better security

    <!–> Thanakorn Lappattaranan/Getty Images Bitwarden has been my favorite open-source password manager for years. Not only is it highly secure, but it’s also user-friendly and available for all platforms (Android, iOS, Linux, macOS, Windows, and web). Bitwarden has a number of tricks up its sleeve but there’s one particular trick you might not even know […] More

  • in

    You can get a share of Google’s $23 million dollar settlement. Here’s how

    <!–> NurPhoto/Getty Images Google reached a $23 million settlement on a class action lawsuit filed against the company for sharing users’ referrer headers, which include users’ search terms, with third parties.  Although Google denies any wrongdoing in the settlement, it is still willing to pay you some money.  Also: Best secure browsers to protect your privacy […] More

  • in

    Are smartphone thermal cameras sensitive enough to uncover PIN codes?

    <!–> Getty Images/Tatyana Aksenova / 500px I’m a huge proponent of the thermal cameras built into smartphones. They’re a super handy tool for the DIYers, engineers, and technicians. They give you a superpower – the ability to see heat. Why is this useful? I’ve found a lot of reasons – from finding components that are […] More