A set of new requirements proposed by the US Department of Health and Human Services’ (HHS) Office for Civil Rights could bring healthcare organizations up to par with modern cybersecurity practices. The proposal, posted to the Federal Register on Friday, includes requirements for multifactor authentication, data encryption and routine scans for vulnerabilities and breaches. It […]
Every year has its own mix of digital security debacles, from the absurd to the sinister, but 2024 was particularly marked by hacking sprees in which cybercriminals and state-backed espionage groups repeatedly exploited the same weakness or type of target to fuel their frenzy. For attackers, the approach is ruthlessly efficient, but for compromised institutions—and […]
Scammers are out of control. Every year, fraudsters and cybercriminals make billions by tricking people into parting with their cash. Romance fraud, business email compromise, investment scams, sextortion—the list of ways criminals prey on people is virtually endless and constantly changing. Add to that impersonation scams, where a criminal pretends to be someone known to […]
TikTok’s breakneck rise from niche video-sharing app to global social media behemoth has drawn intense scrutiny, particularly over its links to China. A TikTok logo statue. File photo: Anthony Quintano, via Flickr CC2.0. In Washington, the platform has been accused of espionage. The European Union suspects it was used to sway Romania’s presidential election in […]
Google’s recent announcement of the arrival of Willow, a quantum chip that has reduced the error tendencies of some of its predecessors, is a milestone in the effort to bring quantum computing into the real world, and in the years ahead, it could change the way we think about the risk in cryptocurrencies. Willow’s speed […]
As PCMag's cybersecurity expert, I interview industry professionals all year long. One thing I ask them all: “What's the security and privacy advice you give to your family and friends?” Here's that wisdom, along with some of my top tips. Throughout 2024, I talked to experts about everything from the rise of generative AI-assisted scams […]
Amnesty International has revealed that phones belonging to Serbian activists and journalists have been hacked by Serbian intelligence and police using Israeli spyware and other mobile device forensics tools. The software is being used “to unlawfully target journalists, environmental activists and other individuals in a covert surveillance campaign”, Amnesty said on Monday. Many individuals who […]
CrowdStrike commissioned a survey of 1,022 cybersecurity professionals worldwide to assess their views on generative AI (GenAI) adoption and its implications. The findings reveal enthusiasm for GenAI’s potential to bolster defences against increasingly sophisticated threats, but also trepidation over risks such as data exposure and attacks on GenAI systems. While much has been speculated about […]
The original version of this story appeared in Quanta Magazine. For thousands of years, if you wanted to send a secret message, there was basically one way to do it. You’d scramble the message using a special rule, known only to you and your intended audience. This rule acted like the key to a lock. […]
Solopreneurs Can Take Advantage of This 15-Month Norton 360 Subscription for Only $10 | Entrepreneur
Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners. Running a small business comes with countless responsibilities, including protecting your digital assets. From customer data to internal […]