#digital-security

[ follow ]
Mail Online
1 week ago
Information security

I'm a tech expert... here's how to stop a cyberstalker in their tracks

Seek help from authorities and take immediate steps to protect digital accounts from cyberstalkers. [ more ]
#privacy
www.dw.com
2 weeks ago
Artificial intelligence

AI Lexicon F DW 05/17/2024

Facial recognition technology has evolved significantly in the past 10-15 years, impacting digital security, privacy, and surveillance. [ more ]
TimesNow
6 months ago
Privacy professionals

Line Messenger Data Leak: Massive Data Breach at LY Corp, 440,000 Personal Records Compromised

Over 300,000 Line app user data exposed in a data breach at LY Corp.
No sensitive financial information or chat messages were compromised.
The breach occurred due to unauthorized access to an affiliate's computer system. [ more ]
moreprivacy
www.independent.co.uk
1 month ago
Privacy professionals

New laws to protect consumers from cyber attacks take effect

Manufacturers legally required to enhance security of smart devices by banning weak default passwords and ensuring transparency in security updates. [ more ]
time.com
1 month ago
Marketing

What a TikTok Ban in the U.S. Could Mean for You

TikTok faces Congressional ban, parent company ByteDance given nine months to sell, potential for extended timeline and user workarounds exist. [ more ]
WIRED
1 month ago
Data science

How to Delete Your Google Account-After Downloading All of Your Data First

Deleting unused accounts reduces online clutter and enhances security.
Google account deletion process is straightforward, wiping out all associated data. [ more ]
Mail Online
2 months ago
Privacy professionals

The rise of 'ghost hacking' - hackers are stealing from the dead

Scammers use 'ghost hacking' to target deceased individuals' accounts for scams and theft.
Family members of the deceased can be emotionally manipulated by such scams. [ more ]
The Drum
2 months ago
Deliverability

How to turn Google and Yahoo's email deliverability requirements to your advantage

Treat email as a trust-building tool for customers' engagement.
Email marketing success hinges on reaching customers' inboxes amidst evolving digital security challenges. [ more ]
www.scientificamerican.com
4 months ago
Digital life

Tomorrow's Quantum Computers Threaten Today's Secrets. Here's How to Protect Them

A quantum computer has the potential to break public-key cryptography, a form of modern cryptography that keeps online transactions secure.
The Y2Q clock is a reminder of the projected date when a quantum computer will be able to break public-key cryptography. [ more ]
Theregister
4 months ago
Privacy professionals

Ransomware victims targeted in follow-on extortion attacks

Ransomware victims are being targeted by criminals posing as security researchers, who offer to delete stolen data or grant access to servers for a fee.
Arctic Wolf Labs identified two cases of victims being extorted by a fake cyber samaritan, believed to be the same individual or group. [ more ]
[ Load more ]