Browsing Category
Information Security
77 posts
Your fertility, your data, or your body our data?
Unfair, unsafe – and also often unclear to women using fertility apps, just what is really going on…
March 22, 2023
How to prevent insider threats in your Active Directory?
Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and…
March 22, 2023
Microsoft 365 exploited in wild through CVSS 9.8 pre-auth RCE bug
A critical vulnerability in the ubiquitous Microsoft Outlook/365 applications suite is being actively abused in the wild and…
March 18, 2023
The privacy loophole in your doorbell
Did you know that your Ring doorbell video footage could be part of police surveillance? Ring saw search…
March 17, 2023
Cybersecurity of AI and standardization
The European Union Agency for Cybersecurity (ENISA) believed that commonly used standards (such as ISO 27001/27002 and ISO…
March 16, 2023
Already thousands of AI impersonation scams
In 2022 so-called impostor scams were the most frequent type of fraud reported in the United States and…
March 9, 2023
FTC: 75% increase in job-related and business scams in 2022
Language programs such as OpenAI’s ChatGPT are another potential tool for scammers to to create profile photos that…
March 8, 2023
Nearly half of websites vulnerable to cyber attack
Cyber security given low priority by businesses Almost half of websites are vulnerable to attacks, yet this is…
March 7, 2023
LastPass: Keylogger on home PC led to cracked corporate password vault
How did the crooks get in given that the needed access credentials of 4 developers at LastPass were…
March 2, 2023
LastPass: Keylogger on home PC led to cracked corporate password vault
How did the crooks get in given that the needed access credentials of 4 developers at LastPass were…
February 28, 2023