Capitalizing on the new Instagram short-form video platform Reels, which launched on August 5th, scammers immediately began profiting from the sale of phony views and likes. According to a Business Insider report, one seller made enough in five days to…
Bringing new products to the market is an exciting time for both a business and its customers. However, it can also be daunting to unveil the curtains without a plan to properly promote and grow your new products among your customer base.
Roger Dingledine is a key figure at the heart of the debate around online privacy. In 2016, Roger co-founded the Tor Project, a highly influential nonprofit that develops free and open-source software to protect people from censorship, tracking and sur…
Twelve Tuesdays from today, the US national elections will take place, and infosec professionals are doing their best to adapt to changing circumstances brought on by both the pandemic and the tense cyber-politics surrounding them.
They say everyone is likely to have a living, breathing Doppelganger. Whether you believe that or not, this is for certain: if you’ve ever used the internet to do something as simple as create an email account or social media profile—like most of us ha…
It’s not only the sheer volume of IoT devices on the market that is growing exponentially, it’s also the types of devices being introduced. To most people, IoT devices used to entail baby monitors, digital speakers, and doorbell cams. But now, there ar…
Since Microsoft discontinued Windows 7 support in January 2020, many businesses made the switch to Windows 10, ensuring they had the latest operating system to securely manage their programs, apps, and files.
The United States National Security Agency (NSA) issued an advisory this week on the dangers of location data exposure, providing various ways users can mitigate the risk. While the guidance in the document is intended for Department of Defense (DoD) e…
In the battle to inspect encrypted web traffic and ensure small and mid-size business (SMB) networks stay secure, one thing is certain — traditional security strategies aren’t enough to stay ahead of malicious web threats.
Late last month, security researchers discovered a major vulnerability in the software that controls how PCs boot their operating systems. This is one of those issues that sounds scarier than it is. Fixing it will be a major process, especially for Lin…