Why no small business is too small for hackers – and 8 security best practices for SMBs

source: zdnet.com  |  image: pixabay.com

 

Don’t fall victim to the ‘small target illusion.’ Learn how cybercriminals exploit SMBs so you can fix your security gaps before it’s too late.

have given hundreds of cybersecurity-related webcasts and presentations, written hundreds of cybersecurity-related articles, and been involved in hundreds of one-on-one cybersecurity-related meetings with clients.

Someone will always respond, comment, or protest that their business is too small for a hacker’s attention.

Small target illusion

But none of these folks understand the economics of a hack when it comes to small businesses. There isn’t a random guy out there who’s decided to target your business. Continue reading “No Small Business Is Too Small For Hackers…”

Critical Vulnerability Found in Canon Printer Drivers

source: securityweek.com  |  image: pixabay.com

Microsoft’s offensive security team has warned Canon about a critical vulnerability affecting some printer drivers. 

According to an advisory published last week by Canon, drivers associated with several production printers, office multifunction printers, and laser printers are affected by an out-of-bounds vulnerability. Continue reading “Critical Vulnerability Found in Canon Printer Drivers”

Meet the AI Fraud Fighters: A Deepfake Granny, Digital Bots and a YouTube Star

source: cnet.com  |  image: pexels.com

 

It was almost an hour into our Google Meet call. I was interviewing Kitboga, a popular YouTube scam baiter with nearly 3.7 million subscribers, known for humorously entrapping fraudsters in common scams while livestreaming.

“I assume I’m talking to Evan Zimmer,” he says with a mischievous glance, his eyes exposed without his trademark aviator sunglasses on. We were close to the end of our conversation when he realized that my image and audio could have been digitally altered to impersonate me this whole time. “If I’m completely honest with you, there was not a single moment where I thought you could be deepfaking,” he says.

Continue reading “Meet the AI Fraud Fighters: A Deepfake Granny+”

A New Era of Attacks on Encryption Is Starting to Heat Up

source: wired.com  |  image: pixabay.com

 

The UK, France, Sweden, and EU have made fresh attacks on end-to-end encryption. Some of the attacks are more “crude” than those in recent years, experts say.

OVER THE PAST decade, encrypted communication has become the norm for billions of people. Every day, Signal, iMessage, and WhatsApp keep billions of messages, photos, videos, and calls private by using end-to-end encryption by default—while Zoom, Discord, and various other services all have options to enable the protection. But despite the technology’s mainstream rise, long-standing threats to weaken encryption keep piling up.

Over the past few months, there has been a surge in government and law enforcement efforts that would effectively undermine encryption, privacy advocates and experts say, with some of the emerging threats being the most “blunt” and aggressive of those in recent memory. Officials in the UK, France, and Sweden have all made moves since the start of 2025 that could undermine or eliminate the protections of end-to-end encryption, adding to a multiyear European Union plan to scan private chats and Indian efforts that could damage encryption. Continue reading “A New Era of Attacks on Encryption Is Starting to Heat Up”