More stories

  • in

    This new Android feature protects your phone, even if someone has your PIN

    ZDNETIn the name of beefing up Android security, Google has added a new feature called Identity Check that automatically locks sensitive settings behind biometric authentication. How Identity Check worksThe feature works when you carry your phone beyond trusted locations. Once Identity Check kicks in, you’ll need to use biometric authentication to access saved passwords and passkeys, autofill passwords in apps, change screen lock and biometrics, factory reset your device, turn off Find My Device and other anti-theft features, set up a new device, add or remove a Google account, and access developer options.Also: How to clear your Android phone’s cache and make it feel like new for 2025The goal of Identity Check is to prevent bad actors from taking control of your Google Account and accessing features that could then enable them to steal data or otherwise compromise the security of your device.How to enable Identity Check More

  • in

    Microsoft Edge offers new tool to combat scareware – here’s how it works

    ZDNETHave you ever encountered a web page that claimed your PC had a virus and asked you to download antivirus software? That type of scam is known as scareware, and it’s a threat that Microsoft is working to counter with a new option in its Edge browser.Also: The Microsoft 365 Copilot launch was a total disasterAvailable in preview mode with the latest version of Edge, the new scareware blocker uses machine learning to identify scareware attacks and help you avoid their usual tactics. After the scareware is thwarted, you can report the malicious site to Microsoft. Here’s how it all works. More

  • in

    The top 10 brands exploited in phishing attacks – and how to protect yourself

    ZDNETCybercriminals who specialize in phishing attacks often spoof popular companies and products to trick unsuspecting users. By impersonating a well-known brand, the scammers try to convince their victims that their malicious emails and web pages are legitimate. A new report from cyber intelligence firm Check Point Research highlights the most spoofed brands so you’ll know which emails and pages to scrutinize.Top 10 most-phished brandsAmong the top 10 most-phished brands in the fourth quarter of 2024, Microsoft remained in the top spot, appearing in 32% of all attacks seen by Check Point. Apple and Google took second and third place, respectively, each appearing in 12% of the attacks.LinkedIn was next with 11%, followed by Alibaba with 4%. Rounding out the list were WhatsApp, Amazon, Twitter, and Facebook, each with 2%. In the tenth spot was Adobe, found in 1% of the phishing campaigns.Also: How to protect yourself from phishing attacks in Chrome and FirefoxAs last quarter marked the traditional holiday season, retail brands were also targeted in phishing attacks. Scammers often create fraudulent retail domains with phony sales and fake discounts to try to steal the passwords and sensitive data of innocent visitors.During the fourth quarter, malicious domains like nike-blazers.fr and adidasyeezy.ro mimicked the legitimate sites of Nike and Adidas. Other retail brands recently exploited included Lululemon, Hugo Boss, Guess, and Ralph Lauren.In its report, Check Point focused on two especially deceptive phishing campaigns. In one attack, the phishing site impersonated PayPal’s login page to try to capture the credentials and financial data of users. In another, a phony website imitated Facebook’s login page to trick people into sharing their account details. Though both sites are now flagged as deceptive, the phishing threat remains in full force. More

  • in

    The best password managers for businesses in 2025: Expert tested

    Businesses face mounting pressure to secure their networks, infrastructure, and data. Cyberattackers often target employees through phishing and social engineering to defraud them or to obtain sensitive data, and this may include credentials. Alternatively, it’s possible to purchase initial access through the Dark Web or to take advantage of leaked username and password combinations to enter a target system quietly. Also: The best password managers: Expert testedSecurity measures to stop unauthorized access vary from company to company, but one solid solution is to use a password manager designed for the enterprise. By doing so, organizations can streamline credential management, enforce password refreshes, stop the use of weak or already-leaked credentials, and improve their overall security posture. What is the best password manager for business right now?If you’re looking for a password manager suitable for your business, our top pick is 1Password More

  • in

    For anonymous browsing, these extensions are the next best thing to Tor

    J Studios/Getty Images The idea behind anonymous browsing is simple: It masks your IP address and location to make it appear that you are located in a different region. This can be beneficial because it prevents third parties from discovering your personal information and identity. You might think that Incognito (or Private) mode is the […] More

  • in

    3 extensions to use for anonymous browsing – and what that even means

    J Studios/Getty Images The idea behind anonymous browsing is simple: It masks your IP address and location to make it appear that you are located in a different region. This can be beneficial because it prevents third parties from discovering your personal information and identity. You might think that Incognito (or Private) mode is the […] More

  • in

    Is classic Outlook crashing when you start or reply to an email? A fix is on the way

    ZDNETThose of you who use classic Outlook may have noticed the program acting more temperamental than usual. There’s a reason for that. In a recent support article, Microsoft acknowledged that Outlook may crash when you start a new email or when you reply to or forward an existing email.The crash only affects classic OutlookThe problem affects only classic Outlook, meaning the version that comes with Microsoft Office or Microsoft 365, and not the new Outlook that the software giant has been pushing in Windows. The glitch is also specific to Outlook version 2412, Build 18324.20168. Also: How to encrypt any email – in Outlook, Gmail, and other popular servicesTo see which version you’re running, select the File menu in Outlook and click Office Account. The description next to the About Outlook icon indicates the version.How to see if it’s affecting youIf Outlook is crashing on you, Microsoft also suggests checking Event Viewer to confirm the issue. To do that, go to Windows Administrative Tools in Windows 10 and Windows Tools in Windows 11 and open Event Viewer. Check the Application Log for crash Event 1000 or Event 1001 with the following details:Faulting application name: OUTLOOK.EXE, version: 16.0.18324.20168, time stamp: 0x677828daFaulting module name: OUTLOOK.EXE, version: 16.0.18324.20168, time stamp: 0x677828daException code: 0xc0000005Fault offset: 0x0000000001a7c02aFaulting process id: 0x0xFD0Faulting application start time: 0x0x1DB65D0FD0B9857Faulting application path: C:Program FilesMicrosoft OfficerootOffice16OUTLOOK.EXEFaulting module path: C:Program FilesMicrosoft OfficerootOffice16OUTLOOK.EXEAlso: Microsoft to force new Outlook app in Windows 10 with no way to block itMicrosoft promises a fix for the bug with Version 2501, Build 18429.20000, expected to be released Jan. 28, 2025. To apply the fix at that time, select File, click Office Account, select the icon for Update Options, and choose Update Now. More

  • in

    How to tell if an AirTag is secretly tracking you – and what to do about it

    ZDNETAn Apple AirTag can help you keep track of your most important items like keys, wallets, remotes, and even bicycles. However, bad actors can misuse AirTags to track people without their consent, casting a shadow on their use.Apple has made significant changes to how AirTags can be used. The company now provides clear disclosures to AirTag owners, reiterating that these trackers are only for tracking belongings and never for unwanted tracking of others. Both iOS and Android devices now alert their users when an unknown Bluetooth tracker is found moving with them, as well.Also: The best AirTag walletsIn this guide, I’ll explain how to identify unwanted trackers, whether it’s an Apple AirTag or another Bluetooth tracking device. You’ll learn how to receive alerts, locate the trackers, and disable them, with helpful tips for both iOS and Android users.How to tell if an AirTag is tracking youWhat you’ll need: To get help locating an unwanted AirTag, you’ll need an iPhone or an Android phone. I discuss in detail below what it looks like on an iPhone when an AirTag tracks you, but this guide has information for Android users, too. If you suspect someone is tracking your movements without your permission using an AirTag or Bluetooth tracking device, your iOS or Android phone should automatically alert you. But be sure to contact law enforcement if you feel you are in any danger.[embedded content] More