More stories

  • in

    What is Security Keys for Apple ID and why does it matter?

    Like any form of multi-factor authentication (MFA), Security Keys for Apple ID is designed to ensure that you’re the only one who can access your account — in this case, your Apple ID account. If used correctly, it can provide you with an extra layer of protection against phishing, social engineering scams and many other cyber attacks. The idea is that even if a hacker does know your password, they can’t access your account without also having access to the physical key.The first layer of authentication is your Apple ID username and password. In this case, the physical key is the second layer of authentication — you need it in your possession to access your account, something which prevents attackers from remotely stealing MFA access codes sent using an app or SMS. Because while MFA applications do help to keep accounts secure, hackers can still remotely intercept codes. If your account is protected with Security Keys for Apple ID, it’s much harder for someone to access your account, because not only would they need your password, they’d need physical access to your device and your hardware key.  More

  • in

    Fewer ransomware victims are paying up. But there's a catch

    Image: Getty Cyber criminals are making less money from ransomware attacks as victims increasingly refuse to pay their ransom demands. Analysis by cryptocurrency and blockchain company Chainanalysis suggests that ransom payments dropped by 40% last year, declining from $765.6 million in 2021 to $456.8 million in 2022. Meanwhile, cybersecurity researchers at Coveware have also suggested that […] More

  • in

    Scientists use Wi-Fi routers to see humans through walls

    Image: Getty Images/iStockphoto Scientists from Carnegie Mellon University have developed a cheap way to sense humans through walls by using two Wi-Fi routers to image a human’s 3D shape and pose.  The researchers outline in a new paper how they used a deep neural network called DensePose that maps Wi-Fi signals (phase and amplitude) to […] More

  • in

    Email is our greatest productivity tool. That's why phishing is so dangerous to everyone

    Image: Getty / ShutterWorx From the most basic ‘you’ve won a prize’ scams to the most advanced espionage campaigns, attacks targeting our inboxes are successful again and again.  There’s a reason cyber criminals and hackers continue to send millions of phishing emails.  Because, no matter whether you’re working from the office or working remotely from […] More

  • in

    Like it or not, email is still our greatest tool – and the source of some of our biggest threats

    Image: Getty / ShutterWorx From the most basic ‘you’ve won a prize’ scams to the most advanced espionage campaigns, attacks targeting out inboxes are successful again and again.  There’s a reason cyber criminals and hackers continue to send millions of phishing emails.  Because, no matter whether you’re working from the office or working remotely from […] More

  • in

    The 5 best VPN routers of 2023

    Features: Wi-Fi 6 | Built-in VPN | 802.11ax, 802.11ac | Diverse server locationsThe ExpressVPN Aircove is our top pick based on the router’s speed, ease of setup, and security. The router offers users dual-band connectivity for homes or offices, providing coverage of up to 1,600 sq. ft.When you pick a VPN-ready router, you still need to consider stability and speed. The Aircove manages speeds of up to 1,200Mbps (600Mbps/2.4GHz) when the VPN is not in use, although, as we should expect, speeds will drop when you are connected to VPN servers. An interesting feature is an option to diversify what servers are used by what devices connected to the router. For example, you might want a gaming PC to be disconnected from the VPN, whereas you want an office laptop to run through a US or UK VPN server. However, in any case, you will also need an ExpressVPN subscription.Read the review: ExpressVPN review: A fine VPN service, but is it worth the price? More

  • in

    C++ programming language and safety: Here's where it goes next

    Image: Getty A group working on the development of the hugely popular C++ programming language has outlined a path to make the language “memory safe” — just like its younger rival, Rust.  Rust has been embraced by Microsoft, AWS, Meta, Google’s Android Open Source Project, the C++-dominated Chromium project (sort of), the Linux kernel, and many more, […] More

  • in

    T-Mobile reports another data breach, impacting 37 million customers

    T-Mobile has been hit by another data breach, this time impacting approximately 37 million customers. The wireless carrier said a bad actor obtained basic customer information — such as names, account numbers, and billing addresses — but did not access any sensitive customer information, including government ID numbers or payment card information.  According to a […] More