Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights

July 2, 2024 at 12:49AM An Australian man has been charged with creating fake Wi-Fi access points during a domestic flight to steal user data. The suspect impersonated legitimate networks, prompting victims to enter personal information. He faces multiple charges and potentially 23 years in prison if convicted. Authorities advise using reputable VPNs for public … Read more

10 Critical Endpoint Security Tips You Should Know

April 26, 2024 at 07:00AM Endpoints are the gateway to a business’s digital kingdom, making them prime targets for hackers. The IDC reports 70% of successful breaches start at the endpoint. To improve endpoint security, start with the top 10 must-know tips in this guide. Covering strategies like proactive patching and multi-factor authentication, it’s a … Read more

Hacker arrested for selling bank accounts of US, Canadian users

February 19, 2024 at 08:38AM A 31-year-old Ukrainian cybercriminal was arrested for operating a cybercrime scheme targeting American and Canadian bank accounts. The suspect distributed trojanized software through websites and promoted them with online advertising. The hacker stole sensitive data and sold access to bank accounts on the dark web, potentially making over $92,000. The … Read more

Cybercriminals Flood Dark Web With X (Twitter) Gold Accounts

January 3, 2024 at 05:08PM Cybercriminals are targeting verified “Gold” accounts on X (previously known as Twitter) and selling them on the Dark Web for up to $2,000. CloudSEK researchers have uncovered a surge in these accounts on underground marketplaces, leading to potential risks such as hosting phishing links, launching disinformation campaigns, and financial scams. … Read more

8 Tips on Leveraging AI Tools Without Compromising Security

November 30, 2023 at 10:07AM AI and ML technologies offer substantial productivity gains but carry risks like data misuse and inaccurate results. To use AI securely, companies must examine legal agreements, guard sensitive data, validate vendor security, use local open-source tools, track AI usage, and create tailored AI policies. Meeting Takeaways: 1. **AI/ML Benefits and … Read more