Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.
Extortion scammers have found a new hook to bait Internet users: old passwords. A new wave of messages that began popping up in mid-July has stepped up the ploy by showing passwords in the subject headers as attention-grabbing ‘proof’ that someone has deeply burrowed into your computer and has your personal information.
Are passwords passé? Increasingly, other security measures are replacing the password, reviving the debate over whether passwords have outlived their usefulness.
A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.
Office 365 users can expect more email to end up in the junk folder — all for a good cause. Microsoft has ramped up its screening of fraudulent email, offering enhanced anti-spoofing protection for holders of Office 365 accounts.
Ransomware may not claim as many victims as in the past, but earlier this year, the city of Atlanta discovered its potency. Ransomware – a computer attack that holds information hostage — can cause tremendous havoc.
Microsoft Office users may find an unpleasant surprise lurking in the form of an infected, remotely embedded Adobe Flash Player bug. Recently Microsoft announced it would block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365 by January 2019. Microsoft cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content.
Facebook, Twitter, LinkedIn, Microsoft, Strava and Soundcloud are among the major online companies that announced plans to update their terms and conditions to comply with a new privacy law out of the European Union (EU). How will the new regulations work?
When cybercriminals call, they employ an arsenal of tricks and tactics. Now that it’s tax season, Forbes warns that scammers will try to take advantage of tax filers using spoofing and other means to obtain valuable personal data. Hanging up is the safest remedy, but there are other ways to avoid phone scams.
Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.
Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.
Here at Sinu, we try to provide the latest tech news, predict trends, and share best practices – especially when it comes to protecting your data and other tech assets. Well, here is where taking our own advice paid off...
In less than 3 years, Adobe's once popular plug-in will no longer be welcomed on the web. So, what really happened to Flash? I would say it goes well beyond security issues and is more about the shift in the way we want to receive information from and interact with our devices.
It’s hard enough to keep your technology secure when you’re working from the office, even harder when you work remotely, but while on vacation, it’s even trickier to keep your devices and data safe. A little bit of preparation and being a little tech security savvy can prevent headaches during your summer vacation and the rest of the year.
Recent hack threats on iCloud have caused concern about the security of the data of over 782 million iCloud users. According to several media sources, hackers are demanding Apple pay a ransom in bitcoin or they'll expose millions of iCloud account credentials and could potentially remotely erase customer iPhones, iPads, or Macs, causing a catastrophic loss of personal data. With so many people using their Apple devices in the workplace, this could result in huge losses of business data and productivity.
Be wary of the USB stick you plug into your computer. These small flash-memory drives used to easily share files from computer to computer have become one of the easiest ways for hackers to install malicious software and gain access to a computer.
There are three ways these malicious attackers use USB sticks to compromise your data and hardware.
Ransomware is a family of malware that blocks access to a PC, server or mobile device, or encrypts all the data stored on that machine. It's typically delivered via malicious email or infected third-party websites. To regain access or control of the data, the user must pay a ransom — typically via bitcoin. The encryption is unbreakable and simply removing the malware will not solve the problem. The victim is forced to pay for the unique software key that will unlock everything. Malwarebytes reports that 60 percent of all malware observed last year was ransomware.
There is a subtle but profound paradigm shift occurring in technology. Cloud-connected hardware is becoming the preferred standard, replacing self-contained hardware. It’s the Internet of Things and it’s happening in just about every industry across consumer and enterprise solutions..
Some time around August 2013, the email system of Yahoo was attacked and the records of more than 1 billion users were stolen. Information included names, birth dates, phone numbers and passwords which were encrypted with an easily broken form of security. Now they are for sale on the Dark Web.
In our attempt to avoid the holiday rush while securing the best deals on brands we love, it is tempting to seek out apps promising a more convenient shopping experience – but mobile buyers BEWARE! The Washington Post reports that a recent study by researchers at RiskIQ found an estimated one in 10 apps advertising Black Friday deals was fraudulent.