More stories

  • in

    What is a Bitwarden Secure note and how do you create one?

    iStockphoto/Getty Images Sometimes you might want to save something to your password manager other than login credentials. Good password managers allow you to save other types of information, such as identities, credit cards, and even notes. More how-tos That’s right, and Bitwarden is no stranger to secure notes. In fact, the tool has a feature […] More

  • in

    Prosecutors charge six, seize 48 domains over DDoS-for-hire services

    Image: Getty The Department of Justice (DoJ) has been authorized to seize 48 internet domains and has laid criminal charges against six individuals who allegedly ran distributed denial of service (DDoS) or “booter” or “stresser” services from the US.  The FBI is seizing the 48 domains that facilitated DDoS attacks for paying customers against targeted […] More

  • in

    These hackers used Microsoft-signed malicious drivers to further their ransomware attacks

    Image: Getty Security firms have reported that multiple hacking groups have been using drivers signed by Microsoft in a series of attacks, including the deployment of Cuba ransomware.  That development matters because many security services will implicitly trust anything signed by Microsoft, During this month’s Patch Tuesday, Microsoft acknowledged reports by SentinelOne, Google-owned Mandiant, and […] More

  • in

    iOS 16.2: These security updates will protect your iPhone from multiple vulnerabilities

    Image: Getty/Zhang Peng Apple has released iOS 16.2, the latest software update for iPhone and iPad, which fixes multiple security vulnerabilities, including several that could allow cyber attackers to run commands and take control of devices.  iOS 16.2 and iPadOS 16.2 contain several new features for iPhone and iPad users, but alongside those are the […] More

  • in

    China lays out ground rules to stem deepfake abuse

    China has laid out ground rules to prevent “deep synthesis” technology, including deepfakes and virtual reality, from being abused. Anyone using these services must label the images accordingly and refrain from tapping the technology for activities that breach local regulations.  Cyberspace Administration of China, Ministry of Industry and Information Technology, and Ministry of Public Security released a joint statement mandating the use of deep synthesis technology and services must be clearly indicated, so these are not mistaken to represent real information. To be effective from January 10 next year, the new rules aim to protect national security and the country’s core social values, as well as safeguard the rights and interests of citizens and organisations, said the government agencies. They noted that while synthesis technology had improved user experience, it also was used to impersonate identifies and disseminate false and harmful information that tarnish victims’ reputation. This endangered national security and social stability. They added that regulations were necessary to mitigate such risks and drive the “healthy” development of new technology. The ground rules also would standardise the development of deep synthesis services and ensure these were in line with the country’s other related regulations, including data security and personal information protection laws.  The new rules will apply to technology that use deep learning, virtual reality, and other synthetic algorithms to create text, images, video, audio, and virtual scenes, including text-to-speech, voice editing, gesture manipulation, digital simulation, and 3D reconstruction.  Apart from not using deep synthesis services to produce and disseminate information prohibited by local laws, the new regulations also outline the need to implement a real identity data authentication system as well as other management systems, such as user registration, algorithm mechanism review, data security, emergency response, and ethics review. In addition, safety technical measures must be established.  These management rules and service agreements must be disclosed. Users also will have to put in place mechanisms to address rumours in a timely manner, should the use of deep synthesis services be used to publish or disseminate false information. The relevant government agencies will need to be notified, too.  RELATED COVERAGE More

  • in

    Microsoft Patch Tuesday fixes six critical vulnerabilities

    By Alberto Garcia Guillen — Shutterstock Microsoft on Tuesday disclosed 56 vulnerabilities, including six critical ones and one moderate vulnerability that has been exploited.  The patches released address common vulnerabilities and exposures (CVEs) in: Microsoft Windows and Windows Components; Azure; Office and Office Components; SysInternals; Microsoft Edge (Chromium-based); SharePoint Server; and the .NET framework. The […] More

  • in

    The 20 best Amazon security camera deals: Ring and Blink on sale

    Current price: $60Original price: $100This is Ring’s most popular video doorbell: the 2020-release, battery-operated model. Featuring 1080p HD video, Alexa voice control, two-way talk, night vision, and advanced motion detection, this video doorbell is at the lowest price we’ve ever seen it before — even lower than during Amazon’s July and October Prime Day sales events.The built-in rechargeable battery makes for an easy installation, since there is no wiring involved, making it a perfect fit for anyone looking to upgrade their current doorbell setup. However, if you prefer a wired installation, this doorbell is also equipped for installation using your existing doorbell’s wiring. Also: What are the best home security systems and do they require Wi-Fi? More