menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Medium

2d

read

265

img
dot

Image Credit: Medium

NordVPN vs Surfshark: Honest Comparison After One Year of Use

  • NordVPN and Surfshark provide strong encryption, no-logs policy, and worldwide coverage.
  • NordVPN edges out with Panama base for better privacy; Surfshark is in Netherlands.
  • Speed tests show NordVPN slightly faster; both excel in streaming and torrenting.
  • Apps are user-friendly with NordVPN's big server network and Surfshark's unique features.
  • Surfshark offers unlimited device protection and extra tools; both have solid security features.

Read Full Article

like

15 Likes

source image

Securityaffairs

3d

read

147

img
dot

Image Credit: Securityaffairs

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

  • Hunters International ransomware gang has announced its shutdown, citing unspecified 'recent developments' and acknowledging its impact.
  • The group is offering free decryption software to all companies impacted by their ransomware as a gesture of goodwill.
  • There is speculation that Hunters International may rebrand itself into a new group called World Leaks to avoid law enforcement tracking.
  • The group emerged after the Hive gang's infrastructure was seized, with Hunters International suspected to be a rebrand of the Hive ransomware gang.

Read Full Article

like

8 Likes

source image

Medium

3d

read

155

img
dot

Image Credit: Medium

Restored Tabs, Forgotten Boundaries

  • Web applications and browser restoration behavior can lead to session preservation misalignments.
  • Failure to handle session restoration appropriately can result in unintentional access risks.
  • Attackers can exploit the gap between browser features and session management for access.
  • User awareness of potential risks from session persistence after crashes is crucial.

Read Full Article

like

9 Likes

source image

Medium

3d

read

387

img
dot

The Right to Be Forgotten: Why It Matters in an Unforgiving Internet

  • The Right to Be Forgotten refers to the ability to request the removal of outdated, irrelevant, or harmful personal information from public search results and websites.
  • The concept gained attention in 2014 when a Spanish citizen sued Google to remove links to a decades-old foreclosure, sparking debates on privacy, public interest, and free speech.
  • In the digital age, where the internet stores a permanent record of our lives, the Right to Be Forgotten holds significance as a way for individuals to control how they are portrayed online.
  • While India has yet to establish a comprehensive Right to Be Forgotten as in Europe, recent court cases and upcoming data protection laws indicate a growing recognition of the need for digital privacy rights.

Read Full Article

like

23 Likes

source image

Medium

3d

read

171

img
dot

Why NFS Version Matters in Cybersecurity: NFSv3 vs NFSv4

  • NFSv3's lack of authentication poses a threat to data security in cybersecurity-sensitive environments.
  • NFSv4 simplifies firewall policies and reduces the attack surface, making it ideal for network segmentation and Zero Trust architecture.
  • In regulated environments like HIPAA and GDPR, NFSv3's lack of encrypted data-in-transit capability can present compliance challenges.
  • Stateful protocols like NFSv4 are crucial for monitoring, auditing, access control, and compliance in forensic investigations.

Read Full Article

like

10 Likes

source image

Securityaffairs

3d

read

372

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

  • North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates.
  • Google fined $314M for misusing idle Android users’ data.
  • Cybercriminals target Brazil in a data breach affecting 248,725 people.
  • Denmark introduces new copyright law to protect against deepfakes.

Read Full Article

like

22 Likes

source image

Medium

3d

read

17

img
dot

Image Credit: Medium

How Private Are Your Gemini or ChatGPT Conversations?

  • A Google security expert revealed Iranian adversaries using AI for 'scouting missions' at London Cyber Week.
  • Gemini and ChatGPT conversations are not personally tracked by the AI language model itself.
  • Google and Gemini manage data for service, improvement, and safety, potentially raising privacy concerns.
  • Gemini Apps Activity is ON by default, storing chats linked to user accounts, prompting questions about informed consent and privacy.

Read Full Article

like

Like

source image

Medium

3d

read

200

img
dot

Image Credit: Medium

Norton 360 Deluxe 2025 Review – Is This the Best Antivirus for You?

  • Norton 360 Deluxe 2025 offers comprehensive protection for up to 5 devices on various platforms, including real-time threat detection, secure VPN, dark web monitoring, parental controls, and 50GB cloud backup.
  • Pros include multi-device coverage, built-in VPN, user-friendly interface, strong defense against phishing and ransomware, and identity protection tools.
  • Cons include potential surprise charges from automatic renewal, variable VPN performance based on location, and slight system speed impact during full scans.
  • User reviews praise Norton 360 Deluxe for its all-in-one features and ease of use, making it a trusted choice for complete digital security in 2025.

Read Full Article

like

12 Likes

source image

Tech Radar

3d

read

157

img
dot

Image Credit: Tech Radar

This surprisingly simple way to hide hardware security keys in mainstream flash memory could pave the way for ultra-secure storage very soon

  • A new hardware security approach called Concealable PUF utilizes commercial 3D NAND flash memory to store and hide encryption keys beneath user data, only revealing them when needed.
  • The technique involves a weak application of the GIDL erase process, making each chip's characteristics unique and unpredictable, creating secure, unclonable keys without requiring structural or circuit changes.
  • Concealable PUF technology passed stress tests and withstood machine learning-based attacks, proving its stability and effectiveness in hiding and revealing keys over 100 times without errors.
  • The innovation allows for easy implementation of hardware-level security in mainstream consumer electronics without added cost or complexity, potentially enhancing security and efficiency in industries like IoT, mobile, and automotive electronics.

Read Full Article

like

9 Likes

source image

Securityaffairs

3d

read

346

img
dot

Image Credit: Securityaffairs

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

  • North Korea-linked threat actors are spreading macOS NimDoor malware disguised as fake Zoom updates to target Web3 and crypto firms.
  • Victims are lured into installing the backdoor via phishing links sent through Calendly or Telegram, allowing the malware to steal data like browser history and Keychain credentials.
  • The malware, written in Nim, employs encrypted communications, can persist on systems, reinfect itself, and uses process injection techniques along with WebSocket C2 communications for exfiltration.
  • The attackers use a unique mix of AppleScript, C++, and Nim in the NimDoor malware, initiating attacks through fake Zoom invites, with two Mach-O binaries dropped to ensure persistence and data theft.

Read Full Article

like

20 Likes

source image

Cultofmac

4d

read

302

img
dot

Image Credit: Cultofmac

Make your data practically unhackable with this decentralized VPN

  • The Deeper Connect Mini is a hardware decentralized VPN that offers protection for online identity and shields from threats.
  • It comes with an ARM64 four-core CPU and a seven-layer firewall to safeguard devices connected to the network.
  • Additional features include parental controls, ad blocking, and multi-routing for enhanced protection while browsing.
  • The Deeper Connect Mini hardware VPN is currently on sale for $179.99, providing a 21% discount off the regular price of $229.

Read Full Article

like

18 Likes

source image

Medium

4d

read

92

img
dot

Image Credit: Medium

The Journey Begins : From Student to Cybersecurity AI Founder

  • A B.Tech CSE student from a tier-3 college is embarking on a journey to build an AI-driven cybersecurity company to safeguard the nation and the digital future.
  • Their ambitious goals include securing a high-paying position in a global tech company within 3 years, growing their startup simultaneously, achieving financial freedom early, and reinvesting in tech, talent, and innovation.
  • Despite lacking prestigious educational backgrounds like IITs or NITs, the individual is driven by passion, clarity, and a determination to succeed through learning and hard work.
  • The individual plans to document their journey over the next 4 years, sharing successes, failures, progress, and learnings, while encouraging others with big dreams to connect and join in shaping the future.

Read Full Article

like

5 Likes

source image

Wired

4d

read

198

img
dot

Image Credit: Wired

Android May Soon Warn You About Fake Cell Towers

  • Justice Department reveals operation to combat North Korean IT worker schemes in the US.
  • US officials address threats from Iran-linked hackers concerning Trump campaign emails release.
  • FBI reports Chinese hacker group lying dormant in US telecoms networks.
  • Deepfake website Clothoff planning aggressive expansion to create explicit images of celebrities.
  • Android to warn about fake cell towers in new hardware advancements for security.

Read Full Article

like

11 Likes

source image

TechBullion

4d

read

125

img
dot

Image Credit: TechBullion

Rahman Shittu: The Data Science Powerhouse Redefining Innovation in the US and Beyond

  • Rahman Shittu, a data powerhouse, redefines innovation in US and globally.
  • His journey from Nigeria to pursuing data science reshapes sectors worldwide.
  • Research on healthcare, e-commerce, cybersecurity, and smart cities show global impact.
  • Rahman's work blends technical expertise with ethical responsibility for a brighter future.

Read Full Article

like

7 Likes

source image

Medium

4d

read

174

img
dot

Image Credit: Medium

Protect Before You Paste: Meet Prompt Security

  • Prompt Security is a cross-platform Go tool designed to protect users from inadvertently leaking sensitive data when using AI assistants.
  • The tool operates in real-time to detect and filter sensitive content on the clipboard before it is pasted, reducing privacy risks for developers, security teams, and power users.
  • Prompt Security automatically replaces sensitive data with safe placeholders and allows users to define custom filtering rules through a config file.
  • The tool is free, open-source, and prioritizes privacy, serving as a valuable resource for professionals who handle confidential information.

Read Full Article

like

10 Likes

For uninterrupted reading, download the app