More stories

  • in

    Windows security: How to protect your home and small business PCs

    <!–> Maintaining effective security shouldn’t take an excessive amount of time.  d3sign/Getty Images When it comes to digital security at home and in your small business, you’re on your own. Large businesses typically have dedicated IT staff tasked with ensuring the security of a corporate network and preventing outsiders from stealing data or planting ransomware. […] More

  • in

    Data poisoning tool lets artists fight back against AI scraping. Here’s how

    <!–> ChamilleWhite/Getty Images A major issue plaguing generative AI models is AI scraping, the process used by AI companies to train their AI models by capturing data from internet sources without the owners’ permission. AI scraping can have an especially negative impact on visual artists,  whose work is scraped to generate new art in text-to-image models. […] More

  • in

    Android trojan spotted in the wild can record audio and phone calls

    <!–> Witthaya Prasongsin/Getty Images No mobile device is 100% safe from malicious attacks. With third-party apps, various phishing campaigns, and malicious links waiting to be tapped, the only way to remain safe is to always be on the alert for what new types of attacks have been discovered. A banking trojan named SpyNote has returned […] More

  • in

    September saw a record 153% increase of ransomware attacks, says NCC Group

    <!–> andresr/Getty Images NCC Group released its Threat Pulse for September, which detailed a shocking increase of 153% in September for ransomware attacks. According to the report, the following groups were listed in the number of attacks: LostTrust RansomedVC LockBit Clop As far as targets for ransomware, North America was once again at the top […] More

  • in

    Make your iPhone super secure. This app shows you how

    First and foremost, iVerify is a security scanner that makes sure you are making use of the iPhone’s basic security features such as Face/Touch ID, Screen Lock, and are running the latest iOS version. It also runs a device scan that looks for security anomalies and gives you a heads-up if something seems out of place.It can be very hard to spot if an iPhone has been hacked, so having a tool installed that keeps an eye out for the telltale signs of intrusion offers peace of mind.iVerify is packed with guides that look at the many different security features built into iOS, and how you can take advantage of them to secure your iPhone (or iPad).There’s also a whole raft of other cool stuff, from information on securing your Apple, Facebook, Google, Instagram, Linkedin, and Twitter accounts, information on activating DNS over HTTPS, a periodic reboot reminder (a simple way to protect yourself from remote exploits), and even a page that offers the latest security news. More

  • in

    Google Chrome is testing a new feature to automatically hide users’ IP addresses

    <!–> DrAfter123/Getty Images When you use your browser, your IP address is visible to websites, online services, and threat actors who can use that information against you for tracking and other privacy-invading actions.  At the same time, IP addresses are also necessary for things like traffic routing and fraud prevention. Also: Cybersecurity 101: Everything on […] More

  • in

    61% of firms worry they are unprepared for security risks in quantum era

    <!–> Eugene Mymrin/Getty Images Enterprises are worried they are ill-prepared to deal with potential cybersecurity risks brought on by quantum computing.  Some 61% have expressed concern their organization is not and will not be prepared to handle security implications that may surface in a post-quantum computing future, according to a survey conducted by Ponemon Institute. […] More