menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

Cyber Security News

source image

Idownloadblog

1M

read

58

img
dot

Image Credit: Idownloadblog

iCloud Passwords extension that brings iCloud Keychain auto-fill to Firefox for macOS now owned by Apple

  • Apple has acquired the iCloud Passwords extension for Firefox on macOS.
  • The extension integrates with Apple's Passwords app and allows automatic filling of login credentials saved in iCloud.
  • New passwords created in Firefox will also be added to iCloud Keychain with the extension installed.
  • The extension is not available for Firefox on Windows.

Read Full Article

like

3 Likes

source image

Siliconangle

1M

read

407

img
dot

Image Credit: Siliconangle

US urges use of encrypted messaging apps following Salt Typhoon hack

  • U.S. officials are urging Americans to use encrypted messaging apps to prevent correspondence from being hacked.
  • The guidance follows a large-scale cyberattack campaign against U.S. telecommunications companies by a Chinese state-backed hacking group.
  • Officials recommend using encryption for text messaging and encrypted voice communication to enhance security.
  • Other cybersecurity guidance includes implementing multifactor authentication and using devices with timely operating system updates.

Read Full Article

like

24 Likes

source image

Siliconangle

1M

read

237

img
dot

Image Credit: Siliconangle

SentinelOne shares fall 13% as loss expands despite revenue beat

  • Shares in SentinelOne Inc. were down around 13% as the cybersecurity company reported a widening loss in Q3 2025.
  • SentinelOne reported revenue of $210.6 million, up 28% YoY, beating analyst expectations.
  • The company's net loss increased to $78.4 million, driven by higher operating expenses.
  • SentinelOne announced the expansion of its AI-driven capabilities and provided a conservative outlook for Q4 revenue.

Read Full Article

like

14 Likes

source image

Mcafee

1M

read

152

img
dot

Image Credit: Mcafee

How to Protect Your Data While On-the-Go

  • Public Wi-Fi networks are notorious for their lack of security and can expose your data to hackers. To protect your data while on public Wi-Fi, the most effective way is by using a Virtual Private Network (VPN). A VPN encrypts your internet connection and creates a secure tunnel between your device and the internet, making it virtually impossible for hackers to intercept your data.
  • While using a VPN, it’s wise to avoid performing sensitive transactions on public Wi-Fi networks. Connect to Secure, private networks when performing activities like online banking, shopping with credit cards, or accessing sensitive work documents.
  • Always verify the official network name with a staff member before connecting, especially in places like airports, hotels, or cafes to avoid rogue hotspots set up by hackers to lure unsuspecting users.
  • Protecting your data on public Wi-Fi isn’t just about the network—it’s also about securing your devices. Keep your operating system, apps, and security software up-to-date to patch any vulnerabilities. Install reliable antivirus software to detect and block malware or suspicious activity and enable firewall protection to filter and analyze incoming data.
  • Disable the feature that automatically connects your device to open Wi-Fi networks and delete cookies and browsing history to remove any stored login credentials to further protect your devices.
  • In summary, take a few simple steps to significantly reduce your exposure while traveling this winter like using a VPN, avoiding sensitive transactions on public Wi-Fi, spotting suspicious Wi-Fi networks, keeping your devices secure, and clearing your browser cache.
  • So, whether you’re sipping hot cocoa in a ski lodge or waiting for a flight home this winter season, stay connected, stay secure, and make the most of your winter travels.

Read Full Article

like

9 Likes

source image

Siliconangle

1M

read

246

img
dot

Image Credit: Siliconangle

Vaultree open-sources its technology for computation on encrypted data

  • Data encryption startup Vaultree Ltd. has open-sourced elements of its technology stack.
  • The released technology allows operations to be performed on encrypted data without decryption.
  • Vaultree's approach addresses scalability limitations of Full Homomorphic Encryption (FHE) schemes.
  • The open-sourced technology aims to foster transparency and feedback from the encryption community.

Read Full Article

like

14 Likes

source image

Digitaltrends

1M

read

313

img
dot

Image Credit: Digitaltrends

Sticky Password review: the offline, on-device password manager

  • Sticky Password offers a unique offline mode that uses your device and network as an alternative to cloud syncing. It supports various platforms such as Windows, macOS, Linux, iOS and Android. Sticky Password Premium costs $20 annually but you can buy a lifetime subscription to Sticky Password Premium for $40. The layout is simple, clean and intuitive. Sticky Password supports the most basic features of a password manager, like autofill. Multiple sharing options are available when logged in with Sticky Password Premium, but it requires a free or paid Sticky Password account to access a shared item. Support comes from email only.
  • Sticky Password’s offline mode puts you in charge of security and good antivirus software is critical in this case. There’s also a cloud storage mode that uses industry standard end-to-end encryption to keep account logins safe. Sticky Password has not had any independent audits to assess its security, so it is unknown if the cloud storage option is as robust as its competitors. Sticky Password is the best password manager for anyone who wants to reduce their subscription burden and take charge of their own security.

Read Full Article

like

18 Likes

source image

TechCrunch

1M

read

304

img
dot

Image Credit: TechCrunch

It’s the Senate’s last chance to pass the PRESS Act

  • The PRESS Act, a federal shield bill, is awaiting a final vote in the Senate.
  • If passed, the bill would provide nationwide protections for journalists, safeguarding their confidential sources.
  • Recent government abuses, such as the seizure of phone records from journalists, have highlighted the need for these protections.
  • The bill has bipartisan support but remains stuck in the Senate Judiciary Committee.

Read Full Article

like

18 Likes

source image

Dev

1M

read

416

img
dot

Image Credit: Dev

OS Security and Passwords 🔐: Protect Your Digital Universe! 🛡️

  • Understanding Basic Computer Security: Regular updates, active firewall, and effective antivirus are key components of a secure operating system.
  • Attack Types and Defense Strategies: Counter phishing, malware, and ransomware attacks through identifying suspicious sources, critical email analysis, and regular data backup.
  • Password Policy and Best Practices: Follow recommendations like using complex passwords, regular renewal, and implementing two-factor authentication for enhanced security.
  • The Bottom Line: Cybersecurity is necessary to protect your digital universe. Stay vigilant, informed, and one step ahead of threats.

Read Full Article

like

25 Likes

source image

Securityaffairs

1M

read

273

img
dot

Image Credit: Securityaffairs

Black Basta ransomware gang hit BT Group

  • BT Group's Conferencing division shut down some servers following a Black Basta ransomware attack.
  • The attack did not impact live BT Conferencing services.
  • Black Basta ransomware gang claimed to have stolen 500GB of data from BT Group.
  • Black Basta has targeted various critical infrastructure sectors and impacted over 500 organizations worldwide.

Read Full Article

like

16 Likes

source image

TechCrunch

1M

read

435

img
dot

Image Credit: TechCrunch

OpenAI inks deal to upgrade Anduril’s anti-drone tech

  • OpenAI and Anduril have partnered to upgrade Anduril's anti-drone technology for the U.S. military.
  • OpenAI's AI tech will be integrated into Anduril's software to assess and track unmanned aircraft.
  • This collaboration aims to improve the accuracy and speed of responding to drones, reducing collateral damage.
  • OpenAI's technology will not be used with Anduril's other weapons systems as part of the agreement.

Read Full Article

like

26 Likes

source image

Securityaffairs

1M

read

237

img
dot

Image Credit: Securityaffairs

Authorities shut down Crimenetwork, the Germany’s largest crime marketplace

  • Germany’s largest crime marketplace, Crimenetwork, has been shut down, and an administrator has been arrested.
  • Crimenetwork facilitated the sale of illegal goods and services since 2012, serving as a hub for cybercriminal activities.
  • The police arrested the 29-year-old administrator and seized €1M in assets.
  • The operation was carried out by the Public Prosecutor’s Office, the Central Office for Combating Cybercrime, and the Federal Criminal Police Office.

Read Full Article

like

14 Likes

source image

Mcafee

1M

read

130

img
dot

Image Credit: Mcafee

Winter Travel Wi-Fi Safety: How to Protect Your Data While On-the-Go

  • More than half of Americans are preparing to travel this winter, but there is a risk involved in using public Wi-Fi networks. These networks are often open and lack security, leaving users vulnerable to cyberattacks in airports, coffee shops, hotels, and even ski lodges. Even with VPN protection, sensitive transactions such as those involving information for work, credit cards, or bank accounts should be avoided on public Wi-Fi whenever possible. They can offer opportunities for hackers to intercept data, steal sensitive information, and spy on Internet activity. A few simple steps, including verifying the official network name with staff before connecting, updating software, using firewall protection, and turning off automatic Wi-Fi connections, can significantly reduce personal risk when using public Wi-Fi.
  • VPN services are the most effective way to protect information. When using a VPN, private data is encrypted through a secure tunnel, making it impossible for hackers to steal it. The VPN will also hide a user’s IP address, adding another layer of anonymity. Sensitive transactions should still be avoided on public Wi-Fi. Alternatives include using mobile data or waiting until a secure network is available. Also, try to use official mobile applications for sensitive accounts rather than browsers as most of the former have built-in security features.
  • There are red flags to watch out for when using public Wi-Fi , such as unsecured networks that do not require a password. Suspect networks may also have strange names and unusual or excessive login pages. Checking with staff members before connecting is one way to avoid opting for a potential trap.
  • It is not only the network that is a risk. A cybercriminal can exploit any vulnerabilities present in a device to gain access to personal information. Keeping devices updated and patched, using antivirus software and enabling firewall protection are recommended. An active firewall acts as a gatekeeper for the internet connection, monitoring incoming data and blocking unauthorized access as well as preventing malware from infiltrating a user's network. Turning off automatic Wi-Fi connections and regularly deleting browsing history and cookies will also help to limit the risk of cyberattack.
  • Winter travel may be exciting, but with free Wi-Fi readily available, it is important to make sure to prevent data theft. By employing these simple tips, such as using a VPN, securing your device and being cautious of suspicious network names, traveling during winter can be both enjoyable and secure.

Read Full Article

like

7 Likes

source image

Sdtimes

1M

read

22

img
dot

Image Credit: Sdtimes

New report shows signs of slowing supply chain security momentum, plateaued DevOps maturity

  • The State of Open Source report by Snyk reveals signs of slowing supply chain security momentum and plateaued DevOps maturity.
  • Dependency tracking and code ship frequency have shown little change since last year.
  • There is a decline in organizations implementing new tooling for supply chain vulnerabilities and investing in training on supply chain security.
  • Many organizations are displaying signs of 'AppSec exhaustion', with reduced engagement in security practices.

Read Full Article

like

1 Like

source image

Dev

1M

read

13

img
dot

Image Credit: Dev

Formal Verification: Bridging Theory and Practice

  • The Solidity compiler's move to the Via-IR pipeline introduces Yul as a universal intermediate representation, bridging the gap between Solidity and the EVM bytecode.
  • The modular nature of the Via-IR pipeline allows independent analysis and verification of transformations, ensuring correctness and gas efficiency.
  • The formalization of Yul's semantics provides a rigorous definition of behavior, enabling precise reasoning and enhancing contract resilience.
  • The combination of formal verification with practical testing balances mathematical rigor and real-world challenges, ensuring secure and efficient smart contract development.

Read Full Article

like

Like

source image

Medium

1M

read

67

img
dot

Image Credit: Medium

The Art of Disappearing Online: Someone Is Always Watching

  • Using a virtual private network (VPN) is recommended for online privacy.
  • Delete your past and reduce your online presence, including cleaning up social media accounts.
  • Ensure encryption for advanced privacy and use unique names, emails, and passwords for each account.
  • To maintain high privacy, stay updated on operational security techniques and avoid common privacy mistakes.

Read Full Article

like

4 Likes

For uninterrupted reading, download the app