More stories

  • in

    9 top mobile security threats and how you can avoid them

    <!–> Tero Vesalainen/Getty Images Today’s smartphones hold all the keys to our communications, finances, data, and social lives, which makes these ubiquitous devices lucrative targets for cybercriminals.    Special Feature Whatever smartphone you use – whether it’s an Android device from Google, Samsung, or Motorola, or an Apple iOS-based iPhone – threat actors are ever […] More

  • in

    The top 9 mobile security threats and how you can avoid them

    <!–> Tero Vesalainen/Getty Images Today’s smartphones hold all the keys to our communications, finances, data, and social lives, which makes these ubiquitous devices lucrative targets for cybercriminals.    Special Feature Whatever smartphone you use – whether it’s an Android device from Google, Samsung, or Motorola, or an Apple iOS-based iPhone – threat actors are ever […] More

  • in

    Multi-factor authentication: How to enable 2FA and boost your security

    <!–> Diki Prayogo/Getty Images You are one data breach away from having your entire online life turned upside down. The problem is passwords, which are hopelessly fragile ways to secure valuable resources. Special Feature Don’t be lulled into a false sense of security by the belief that creating a longer, more complex, harder-to-guess password will […] More

  • in

    Equinix’s data center system upgrade results in hours-long disruption at banks

    <!–> IR_Stone/Getty Images Equinix has confirmed that a scheduled system upgrade at one of its data centers in Singapore affected the operations of several customers, including two banks.  It led to hours-long disruptions that left ATM and online banking services unavailable over the weekend.  Also: Asian banks are a favorite target of cybercooks, and malicious […] More

  • in

    Singapore and US sync up on AI governance and set up joint group

    <!–> Andriy Onufriyenko/Getty Images Singapore and the US have synced up their respective artificial intelligence (AI) frameworks to ease compliance and will continue to work together to drive “safe, trustworthy, and responsible” AI innovation.  Singapore’s Infocomm Media Development Authority (IMDA) and the US National Institute of Standards and Technology (NIST) completed the joint mapping exercise […] More

  • in

    What is the dark web? Here’s everything to know before you access it

    When the dark web is mentioned online, it is usually in tandem with criminal marketplaces and arrests made by law enforcement agencies. Drugs, weapons, and stolen IP and data are all hot businesses on the dark web, with terabytes of information on offer. Traders cash in on stolen credit card data dumps, initial access points to vulnerable systems, credentials, and intellectual property belonging to companies compromised during cyberattacks.However, the dark web has far more uses for organizations and individuals than what a small subset of criminals do under its umbrella.Also: The cheapest VPNs (that won’t slow down your connection)To access a dark web address, you must use a VPN and a suitable browser (it should be Tor). The aim is to reduce your online footprint as much as possible, anonymize your traffic, and disguise your location. There are many legitimate uses for dark web services and communication. For example, this can include tools hosted for combating censorship — critical services for individuals in countries with stringent government surveillance and control, as well as privacy-enhancing anonymous email and whistleblower drop boxes.Some media outlets also maintain an online presence via the dark web when their surface websites are blocked, and other websites do the same when they are banned at the ISP level by countries during periods of unrest. Also: How to use Tor browser (and why you should)Yes, the dark web has an unsavory reputation. However, remaining anonymous can be invaluable to protesters, civil rights groups, journalists, lawyers, and other vulnerable groups. Illegal marketplaces are merely a small fraction of what’s actually there. More