Understanding IoT security risks and how to mitigate them

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? Imagine all traffic lights in a city turning green simultaneously, much like in Die Hard 4. Could a movie plot become a reality? Does it actually require a great leap of the imagination? … More Understanding IoT security risks and how to mitigate them

5 common Ticketmaster scams: How fraudsters steal the show

Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account. Thanks to advances in technology, buying tickets to your favorite show has probably never been easier – as long as you … More 5 common Ticketmaster scams: How fraudsters steal the show

How To Protect Your Phone and Data Against Face Stealing Scams

Cybercriminals can now steal facial recognition data and use AI to create deepfakes for authentication. What does it mean for consumers and business?   Recently, facial recognition technologies have become an increasingly popular tool for secure authentication, one praised for its convenience. When technology giants such as Apple popularized their Face ID technology for face authentication, … More How To Protect Your Phone and Data Against Face Stealing Scams

Europol Cracks Down on Criminals Exploiting Cobalt Strike Tool

Europol, in collaboration with the private sector, has dismantled numerous unlicensed versions of Forta’s Cobalt Strike red teaming tool. Although Cobalt Strike is intended for legitimate security testing, unauthorized copies have been linked to malware and ransomware investigations, writes CyberNews*. Operation MORPHEUS, a four-day effort involving international authorities, resulted in the takedown of 593 IP … More Europol Cracks Down on Criminals Exploiting Cobalt Strike Tool