That water bottle you’re carrying says a lot more than ‘hydration’

source: apnews.com  |  image: pexels.com

 

If you like to stay hydrated no matter where you go, chances are you’ve got a reusable water bottle or two. Or 10. (The collectors know who they are.)

Whether you’re a tech enthusiast, fashion trendsetter, hiker, commuter or just an eco-conscious consumer, there’s a bottle out there for you. There are bottles that sterilize themselves. Bottles that remind you when to drink. Bottles designed for sustainability. And bottles transformed by a paintbox of colors and imagery into mini artworks.

Hydration’s become more than a necessity. It’s got a personality. Continue reading “That water bottle you’re carrying says a lot more than ‘hydration’”

Why no small business is too small for hackers – and 8 security best practices for SMBs

source: zdnet.com  |  image: pixabay.com

 

Don’t fall victim to the ‘small target illusion.’ Learn how cybercriminals exploit SMBs so you can fix your security gaps before it’s too late.

have given hundreds of cybersecurity-related webcasts and presentations, written hundreds of cybersecurity-related articles, and been involved in hundreds of one-on-one cybersecurity-related meetings with clients.

Someone will always respond, comment, or protest that their business is too small for a hacker’s attention.

Small target illusion

But none of these folks understand the economics of a hack when it comes to small businesses. There isn’t a random guy out there who’s decided to target your business. Continue reading “No Small Business Is Too Small For Hackers…”

AI Can Crack Your Passwords Fast—6 Tips To Stay Secure

 

source: forbes.com (contributed by Steve Page)  |  image: pexels.com

 

Do you think your trusty 8-character password is safe? In the age of AI, that might be wishful thinking. Recent advances in artificial intelligence are giving hackers superpowers to crack and steal account credentials. Researchers have demonstrated that AI can accurately guess passwords just by listening to your keystrokes. By analyzing the sound of typing over Zoom, the system achieved over 90% accuracy in some cases.

And AI-driven password cracking tools can run millions of guess attempts lightning-fast, often defeating weak passwords in minutes. It is no surprise, then, that stolen or weak passwords contribute to about 80% of breaches​.

The old password model has outlived its usefulness. As cyber threats get smarter, it is time for consumers to do the same.

AI Makes Cracking Passwords Easier Than Ever

Gone are the days when a hacker had to manually try “password123” or use basic tools to brute-force your account. Now, AI algorithms can crack passwords with frightening speed and sophistication. For example, according to Security Hero, AI-powered tools like PassGAN can crack 51% of common passwords in less than a minute.

Machine learning models can also automate “credential stuffing” attacks (trying breached passwords on other sites) much faster and more intelligently. Continue reading “AI Can Crack Your Passwords Fast…”

Clickfix:  How to Infect Your PC in 3 Easy Steps

source: krebsonsecurity.com  |  image: pexels.com

 

A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ClickFix,” the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware. Continue reading “ClickFix: How to Infect Your PC in Three Easy Steps”

The US Is Considering a TP-Link Router Ban—Should You Worry?

source: wired.com  |  image: pexels.com

 

Several government departments are investigating TP-Link routers over Chinese cyberattack fears, but the company denies links.

TP-Link is one of the most popular routermanufacturers in the US, but the company is facing a potential ban due to security concerns about its links to China. A December report from The Wall Street Journal revealed that the US Commerce, Defense, and Justice Departments are investigating TP-Link, though no evidence of deliberate wrongdoing has yet emerged.

“We are a US company,” Jeff Barney, president of TP-Link told WIRED, “We have no affiliation with TP-Link Tech, which focuses on mainland China, and we can prove our separateness.” Continue reading “The US Is Considering a TP-Link Router Ban—Should You Worry?”

ChatGPT’s Deep Research just identified 20 jobs it will replace. Is yours on the list?

source: zdnet.com (contributed by Artemus founder, Bob Wallace)  |  image: pexels.com

 

After researching 24 sources in seven minutes, ChatGPT came up with the top jobs that might be on the chopping block.

This week, OpenAI launched its Deep Research feature which can synthesize content from across the web into one detailed report in minutes leveraging a version of the company’s latest model, o3

This feature is a powerful tool for workers, as it can save them hours by completing research autonomously. But can the technology’s underlying model replace workers? Yes, suggests Deep Research. Continue reading “ChatGPT’s Deep Research just identified 20 jobs…”

X is blocking links to Signal

source: theverge.com (contributed by FAN, Steve Page)  |  image: pexels.com

Users attempting to add their Signal.me URL to posts, DMs, and bio descriptions are being met with error messages.

X users are currently unable to post links to Signal.me, which are used to quickly and securely send direct messages to Signal users. A variety of failure notifications are being reported when X users attempt to post Signal links on the platform, some of which identify the blocked message as containing spam, harmful content, or malicious activity. Continue reading “X is blocking links to Signal”

We’re In for a Rude Awakening on Cybersecurity

source: city-journal.org (contributed by FAN, Steve Page)  |  image: pexels.com

America remains ill-prepared for Chinese hackers targeting critical infrastructure.

It’s a crisis that almost no one is talking about. The Chinese Communist Party is now the world’s preeminent practitioner of cyber warfare. Once notoriously loud and clumsy, the CCP’s hackers have become stealthy and sophisticated. They’re intercepting the calls and texts of our leaders and infiltrating servers at our ports, power plants, and water-treatment facilities. Yet hardly anyone seems to care. When Congress held hearings on cybersecurity late last year, only a handful of journalists bothered to cover them. Continue reading “We’re In for a Rude Awakening on Cybersecurity”

FBI Sounds Alarm Over AT&T Hackers Stealing Agent Call Logs That Man Expose Informants

source: ibtimes.com (contributed by Steve Page)  |  image: fbi.gov

 

Hackers who breached AT&T’s systems may have handed criminals a roadmap to FBI informants

 

Hackerswho breached AT&T‘s systems may have handed criminals a roadmap to FBIinformants, stealing call logs that could unravel investigations and jeopardize lives, according to alarming new details revealed Thursday.

FBI officials have warned that last year’s AT&T system breach likely led to the theft of months’ worth of call and text records tied to federal agents, raising concerns about the safety of confidential informants, Bloomberg News reported. Continue reading “FBI Sounds Alarm Over AT&T Hackers…”

Chinese hackers infiltrated US Treasury Secretary’s PC — attackers had access to over 400 PCs

source: tomshardware.com (contributed by Steve Page)  |  image: pexels.com 

 

As reported last week, Chinese hackers infiltrated the U.S. Department of Treasury and gained access to several users’ workstations. However, according to Bloomberg, the infiltration was more severe than initially reported, as hackers managed to access systems belonging to Secretary Janet Yellen and other top officials.