Fake Accounts Are Not Your Friends!
Inflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.
Cyber NewsInflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.
Cyber NewsAnti-porn “shamware” apps take a privacy pounding, is your image already being used by AI, and deepfake danger continues to deepen. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown’s Thom Langford.
Cyber NewsThe banks and brokerages were fined because employees were messaging and texting with clients without recording the communications, as required. And some of the firms’ execs lied about it and deleted messages.
Cyber NewsMalware used in the STEEP#MAVERICK campaign features rarely seen obfuscation, anti-analysis, and evasion capabilities.
Cyber NewsCryptojacking is the most common form of attack against container-based systems running in the cloud, while geopolitical motivations—mainly related to Russia’s war against Ukraine—factored into a fourfold increase in DDoS (distributed denial-of-service) attacks this year, according to a new report from cybersecurity company Sysdig. To read this article in full, please click here
Cyber NewsExternal researchers contributed 16 of the 20 security updates included in the new Chrome 106 Stable Channel rollout, including five high-severity bugs.
Cyber NewsThe average cost of a data-exposing cybersecurity incident is $4.35 million. If your business can’t avoid to pay, make sure you’ve got a strong data loss prevention practice in place.
Cyber NewsShocking phishing numbers (more than 1 million in a single quarter) are being driven by vishing, smishing, and other lures that target mobile devices.
Cyber NewsThe team’s annual survey finds that the right development culture is better than technical measures when it comes to shoring up software supply chain security practices. An additional benefit: Less burnout.
Cyber News