How to use Hide My Email in iOS 15
For an iOS 15 feature that's meant to be incredibly easy to use, Hide My Email comes with a lot of options. Here's what you can - and as yet, can't - do.You're going to be using Hide My Email a lot, although you'll rarely go to this particular screen.....»»
Apple alerts some iPhone users that they were targets of ‘mercenary spyware attack’
Apple is alerting users to a new instance of an identified mercenary spyware attack on the iPhone. Possible victims have been sent an email from Apple describing how the attack could “remotely compromise the iPhone”. Victims are being notified in.....»»
Darktrace ActiveAI Security Platform helps organizations shift focus to proactive cyber resilience
Darktrace has introduced the Darktrace ActiveAI Security Platform. The platform includes Darktrace’s existing security products supplemented by a set of new innovations and features, including for email and operational technology (OT). The plat.....»»
How malicious email campaigns continue to slip through the cracks
In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have found that mal.....»»
Security Bite: iCloud Mail, Gmail, others shockingly bad at detecting malware, study finds
Email security today has many shortcomings. It is widely known that email service providers cannot prevent every suspicious email from being received. However, a new study by web browser security startup SquareX reveals how little companies are doing.....»»
Apple says ‘system error’ led to incorrect emails sent to Apple Card users
Apple is sending an email to Apple Card users today informing them of a “system error” that occurred on Monday. According to the email, this led to some Apple Card users erroneously being told they weren’t enrolled in Scheduled Payments. mo.....»»
A “cascade” of errors let Chinese hackers into US government inboxes
Microsoft still doesn’t known how Storm-0558 attackers managed to steal the Microsoft Services Account cryptographic key they used to forge authentication tokens needed to access email accounts belonging to US government officials. “The s.....»»
How to change the default apps on a Mac
From changing your browser and email client to opening specific file types with a new app, changing default apps on your Mac is easy and straightforward......»»
‘App Lock’ lets you protect and hide any app from the iPhone Home Screen
iOS provides developers with an API to lock apps with Face ID or Touch ID. However, not every app has this option, and there’s no way to completely hide apps from your device. Luckily, “App Lock” is a simple but powerful app that helps users pr.....»»
How to change your Zoom background on Mac and Windows
Need to hide a messy room? Maybe you just want a fun background for your next meeting. You can do both if you know how to set a virtual background in Zoom......»»
How CISOs tackle business payment fraud
In this Help Net Security video, Shai Gabay, CEO of Trustmi, discusses why payments are a source of cyber worry for CISOs. CISOs are worried about Business Email Compromise (BEC), cyber attackers’ use of AI, and securing the supply chain. These.....»»
Thousands of Asus routers taken over by malware to form new proxy service
Outdated Asus routers are being assimilated into a malicious botnet used by hackers to hide their traces.....»»
Scammers steal millions from FTX, BlockFi claimants
Customers of bankrupt crypto platform BlockFi have been targeted with a very convincing phishing email impersonating the platform, asking them to connect their wallet to complete the withdrawal of remaining funds. Judging by this Reddit thread, many.....»»
Study suggests major chemical corporations hide most polluting activities in subsidiaries
According to the EPA's Toxics Release Inventory (TRI), chemical manufacturing is one of the U.S.'s three largest polluters, along with metal mining and electric utilities, which together account for two-thirds of the country's toxic releases......»»
eSentire Threat Intelligence reduces false positive alerts
eSentire launched its first standalone cybersecurity product, eSentire Threat Intelligence, extending eSentire’s protection and automated blocking capability across firewalls, threat intelligence platforms, email services and endpoint agents. eSent.....»»
Cado Security enables organizations to investigate and respond to potential M365 threats
Cado Security announced that the Cado platform now enables customers to acquire Microsoft 365 Unified Audit Log (UAL) to help investigate and respond to Microsoft 365 compromises such as business email compromise (BEC), account takeover (ATO), and in.....»»
New email standards: what you need to know
New email standards: what you need to know.....»»
Netskope and Egress partner to enhance behavioral-based threat detection and response
Egress has announced a partnership with Netskope to enhance behavioral-based threat detection and response, transforming the way organizations manage human risk in cloud email. The partnership enables Egress to aggregate Netskope’s User Confidence.....»»
Microsoft: Russian hackers accessed internal systems, code repositories
Midnight Blizzard (aka APT29), a group of Russian hackers tied to the country’s Foreign Intelligence Service (SVR), has leveraged information stolen from Microsoft corporate email systems to burrow into the company’s source code repositor.....»»
Email security trends in the energy and infrastructure sector
In this Help Net Security video, Mike Britton, CISO at Abnormal Security, discusses how energy and infrastructure organizations face an increased risk of business email compromise and vendor email compromise attacks. According to Abnormal Security da.....»»
5 email apps you should use instead of Gmail or Outlook
Sick of using Gmail and Outlook for your email? We’ve found five email apps that can freshen up your inbox......»»