Using Authy? Beware of impending phishing attempts
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that develops t.....»»
TSMC Arizona plant under fresh scrutiny, with employee doubts, and analyst concerns
The TSMC Arizona plant set to make chips for Apple has been one of the most high-profile results of political attempts to boost America’s chipmaking capabilities – but it is now coming under fresh scrutiny, according to a new report. Some employ.....»»
Rhymetec releases two compliance security offerings
Rhymetec has launched two new service offerings for SaaS companies: PCI Compliance Scanning and Phishing Testing & Training. Both offerings will assist B2B organizations in staying secure and compliant while they continue to grow and innovate. Stayin.....»»
DHL, MetaMask phishing emails target Namecheap customers
A surge of phishing emails impersonating DHL and MetaMask have started hitting inboxes of Namecheap customers last week, attempting to trick recipients into sharing personal information or sharing their crypto wallet’s secret recovery phrase. A.....»»
Volvo CEO stirs up new angst among U.S. dealers
If Volvo attempts to bring its direct sales model to this side of the Atlantic, it will push U.S. retailers into a defensive posture, the brand's dealer board chief warned......»»
EV drivers struggle with declining reliability of charging network
The electric vehicle charging network in the United States is plagued by reliability issues with at least 1 in 5 charging attempts by EV drivers failing, J.D. Power research shows......»»
New infosec products of the week: February 3, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Arkose Labs, Hornetsecurity, HYCU, KELA, and Trulioo. Hornetsecurity unveils two tools to counter rise in phishing attacks and malicious links Hornetsecurity.....»»
Hornetsecurity unveils two tools to counter rise in phishing attacks and malicious links
Hornetsecurity launched two new tools – the QR Code Analyzer and Secure Links – to combat growing cyber threats. These launches come in response to a rise in fake QR codes and the ongoing threat of phishing, which represents 40% of all cyber.....»»
Neustar Security Services introduces UltraDDR for DNS-based user protection
Neustar Security Services has introduced UltraDDR (DNS Detection and Response), a recursive DNS-based protection service aimed at combatting network breaches, ransomware attacks, phishing and supply chain compromise, while enforcing enterprise accept.....»»
D&D maker retreats from attempts to update longstanding “open” license
Negative response to latest draft was "in such high volume" as to force WotC's hand. Enlarge / Artist's conception of D&D fans holding back WotC's attempts to change the game's license. (credit: WotC) Dungeons & Dragons.....»»
Still no joy for Lucy’s stuck solar array, NASA is giving up for now
NASA will not be making any further attempts to fix the solar array of its Lucy spacecraft, at least for now - but the mission should still work as planned......»»
Boston Dynamics’ Atlas robot grows a set of hands, attempts construction work
Atlas goes for "inertially significant" lifts, learns all about Newton's third law. "Give 'em the clamps!" Atlas now has a pair of gripper claws. It also may be time for a new.....»»
Carnivorous oyster mushrooms can kill roundworms with “nerve gas in a lollipop”
Gas chromatography-mass spectrometry ID'd the culprit as the volatile ketone 3-octanone. Enlarge / Oyster mushrooms (Pleurotus ostreatus) serenely growing on a tree trunk in a forest. But nematodes beware! These oyster mushrooms.....»»
Fake DHL emails allow hackers to breach Microsoft 365 accounts
Phishing emails impersonating DHL aim to trick victims into handing over Microsoft 365 credentials......»»
Hackers are using device monitoring software Cacti to install malware
A known vulnerability in Cacti is being used to drop Mirai, with researchers spotting multiple attempts......»»
Beware of this EV with pitiful charging speed — and others like it
Charging your car at home is the best way to go. But when you're on the road, fast charging can seriously help. So why do some EVs still charge so slowly?.....»»
7 security predictions for 2023
What will the security landscape in 2023 look like? Here’s my take. 1. Attackers’ tactics will evolve, and defense strategies will evolve with them With online platforms and social media fully integrated into our daily routine, phishing and socia.....»»
Twitter says leaked emails not hacked from its systems
But it warns users to beware of criminals using the data to send fraudulent messages......»»
Cloudflare unveils several email security and data protection tools
Cloudflare announced several new zero trust email security solutions, compatible with any email provider, to protect employees from multichannel phishing attacks, prevent sensitive data being exfiltrated via email, and help businesses speed up and si.....»»
Apple Fitness+ Kickboxing Review: Beginners, beware
What does a kickboxing instructor think about Apple Fitness+'s new kickboxing classes that let you work out at home?As a former exercise science lecturer who credentialed students, as well as a kickboxing instructor myself, I was excited to see Apple.....»»
The Web3 industry lost billions to crypto fraud last year
Turns out Web3 backers aren't great at spotting fraud attempts......»»