#digital-security

[ follow ]
www.independent.co.uk
2 weeks ago
Privacy professionals

New laws to protect consumers from cyber attacks take effect

Manufacturers legally required to enhance security of smart devices by banning weak default passwords and ensuring transparency in security updates. [ more ]
Mail Online
1 month ago
Privacy professionals

The rise of 'ghost hacking' - hackers are stealing from the dead

Scammers use 'ghost hacking' to target deceased individuals' accounts for scams and theft.
Family members of the deceased can be emotionally manipulated by such scams. [ more ]
Theregister
4 months ago
Privacy professionals

Ransomware victims targeted in follow-on extortion attacks

Ransomware victims are being targeted by criminals posing as security researchers, who offer to delete stolen data or grant access to servers for a fee.
Arctic Wolf Labs identified two cases of victims being extorted by a fake cyber samaritan, believed to be the same individual or group. [ more ]
TimesNow
5 months ago
Privacy professionals

Line Messenger Data Leak: Massive Data Breach at LY Corp, 440,000 Personal Records Compromised

Over 300,000 Line app user data exposed in a data breach at LY Corp.
No sensitive financial information or chat messages were compromised.
The breach occurred due to unauthorized access to an affiliate's computer system. [ more ]
time.com
3 weeks ago
Marketing

What a TikTok Ban in the U.S. Could Mean for You

TikTok faces Congressional ban, parent company ByteDance given nine months to sell, potential for extended timeline and user workarounds exist. [ more ]
WIRED
1 month ago
Data science

How to Delete Your Google Account-After Downloading All of Your Data First

Deleting unused accounts reduces online clutter and enhances security.
Google account deletion process is straightforward, wiping out all associated data. [ more ]
The Drum
2 months ago
Deliverability

How to turn Google and Yahoo's email deliverability requirements to your advantage

Treat email as a trust-building tool for customers' engagement.
Email marketing success hinges on reaching customers' inboxes amidst evolving digital security challenges. [ more ]
www.scientificamerican.com
3 months ago
Digital life

Tomorrow's Quantum Computers Threaten Today's Secrets. Here's How to Protect Them

A quantum computer has the potential to break public-key cryptography, a form of modern cryptography that keeps online transactions secure.
The Y2Q clock is a reminder of the projected date when a quantum computer will be able to break public-key cryptography. [ more ]
[ Load more ]