Security News > 2024 > March
Passwordless authentication is a more secure method of granting access to systems. Passwordless authentication allows users to access a system without the need to provide a password.
The U.S. has imposed sanctions on two individuals and five entities linked to the development and distribution of the Predator commercial spyware used to target Americans, including government officials and journalists. "Today, the Department of the Treasury's Office of Foreign Assets Control designated two individuals and five entities associated with the Intellexa Consortium for their role in developing, operating, and distributing commercial spyware technology used to target Americans, including U.S. government officials, journalists, and policy experts," reads a press release by the Office of Foreign Assets Control.
Another US military man is facing a potentially significant stretch in prison after allegedly sending secret national defense information overseas. Information categorized as Secret refers to data that could reasonably be expected to cause "Serious damage", and Confidential information could lead to cause "Damage" to US national security.
TunnelBear VPN is a user-friendly VPN solution that's great for beginners who don't want an overly technical VPN. In this article, we walk you through how to set up and use TunnelBear VPN. We also answer some frequently asked questions about TunnelBear and its features. Visit TunnelBear VPN. Businesses should consider TunnelBear Teams for additional functionality like admin and account management tools and centralized team billing - which can be beneficial for teams of three or more.
As part of the attack, threat actors used QEMU to create virtual network interfaces and a socket-type network device to connect to a remote server. QEMU offers unique capabilities such as emulating a wide range of hardware and virtual networks, allowing malicious activities to blend in with benign virtualization traffic, and bridging segmented network parts through strategically set up VM pivot points.
Facebook and Instagram users worldwide have been logged out of the sites and are having trouble logging in, receiving errors that their passwords are incorrect. The outage has caused people to automatically get logged out of Meta and for Instagram to no longer work, giving errors like "Couldn't refresh feed."
Video and audio calling features for X Premium users added last year to Elon Musk's version of Twitter have been expanded to everyone on the platform, and we're warning Reg readers yet again to disable the feature - this time because it appears to expose user IP addresses. X even admits that its audio and video calling exposes user IPs on the help page for the feature.
North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called TODDLERSHARK. According to a report shared by Kroll with...
The VPN service provider market is nothing if not crowded, which makes picking a provider a difficult process. Whether you intend to use your VPN for added security when using free Wi-Fi networks, trying to shield your internet use from your ISP or aiming to circumvent geographical restrictions when traveling, how you want to use a VPN should influence what service provider you choose.
While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get through is an especially critical goal. Whether traffic is going from outside to inside or vice versa, having a strong, comprehensive and reliable perimeter security policy is integral to securing organizational data and the employees who use it to do their jobs and conduct company business.