Privacy

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices.

Dubbed pet tech, pet industry developers use the technology to improve the health, well-being, and overall quality of pets' lives. Apparently, they also use it as a source of data acquisition that puts users' security at risk.

Tax fraud schemes in 2022 netted scammers $5.7 billion, more than twice the amount of the previous year, according to the Internal Revenue Service, and there doesn’t appear to be any letup in sight.

AU10TIX is working with Microsoft on Reusable ID, a technology that uses verifiable credentials to enable enterprises to simplify and accelerate ongoing ID verification, reduce customer onboarding costs, automate workflows, and enhance the security of sensitive data.

It is time to tackle the growing problem of removing your personal data from uncontrolled online displays, and there are solutions within your grasp. Protect your identity, reputation, and assets with these strategies to delete your data from public record websites and other online dens of inequity.

SPECIAL REPORT

Waging War on the Sextortion Epidemic

Digital Forensics Corporation is waging war to protect and educate the public about a rapidly growing trend in cybercrime dubbed sextortion, where online predators target teens and young adults with threats to expose sensitive personal photos.

Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity.

The law aims to protect Americans by blocking and prohibiting all transactions from any social media company in, or under the influence of, China, Russia, and several other foreign countries of concern.

The 2022 edition of Mozilla’s Privacy Not Included buyer’s guide has privacy reviews of more than 75 popular consumer electronics gifts.

Compromised credentials provide an easy way for threat actors to get their hands on valuable data possessed by governments. Phishing attacks on civil servants jumped 30% from 2020 to 2021, with one out of every eight workers exposed to phishing threats during the period.

In the coming year, lawmakers will be paying increased attention to workplace monitoring, and whistleblowers may also be demanding monitoring information to support complaints about labor law violations, according to the predictions put together by 10 Forrester analysts.

A recent report highlights the staggering growth of ATO fraud online. In the U.S. alone, around 24 million households have fallen victim to this form of fraud. Social media is one of the driving forces behind the issue, with more than half of all ATOs related to a social media account.

The Trend Micro report cited, as an example, the #EyeMakeup hashtag on Instagram, which has nearly 10 million posts, and #EyeChallenge on TikTok, with more than two billion views, exposing iris patterns good enough to pass iris scanners.

Officials charged Joseph Sullivan with working to hide the data breach from U.S. regulators and the Federal Trade Commission, adding his actions attempted to prevent the hackers from being caught.

Technewsworld Channels