WhatsApp introduces Chat Lock to protect sensitive messages

WhatsApp Chat Lock

WhatsApp has long been one of the more secure messaging apps with mass appeal, largely thanks to end-to-end encryption. This has been boosted further by features such as disappearing messages, and now Meta has added Chat Lock.

The company says that the feature "lets you protect your most intimate conversations behind one more layer of security"; what this means in practice is that message can be password or fingerprint protected. But there is more to Chat Lock than this.

Continue reading

Microsoft is able to look inside your password protected zip files

Open padlock

Microsoft has been spotted scanning for malware within password protected zip files stored on its cloud services.

Security researcher Andrew Brandt was among those to notice that Microsoft appears to be bypassing passwords added to zip archives in order to check for malware. While the intentions of the company may be good, the practice raises serious questions about privacy and security.

Continue reading

Reality check: Time for rugged devices to get a security upgrade!

Zebra-TC7X

Let’s face it, the world is moving at an unprecedented pace. It has become imperative for all industries to evolve and adapt to the digital transformation wave. As the reliance on technology and devices to improve communication and collaboration in the industrial sector increases, mobile devices have been undergoing unbelievable transformations. One such device that is in the spotlight is the rugged handheld devices that are predominantly found in the supply chain, logistics and construction sectors.

For those who were of the notion that handheld devices are just rugged, tough hardware, it is worth taking the time to look at reports that suggest these devices are expected to witness a growth of $1.85bn in the next three years. The digits in billions indicate that it is no longer about having devices that can tough it out at extreme conditions but about revolutionizing a product to suit the dynamic working conditions and to not fade away in the digital transformation wave.

Continue reading

Is the future unified SASE?

SASE, Secure Access Service Edge

Many organizations going through digital transformation are running into roadblocks as their networks become larger and more complex; with approximately 70 percent of companies failing to complete their digital transformation successfully.

The Secure Access Services Edge (SASE) framework has emerged as one of the most effective solutions for getting firms back on track. SASE solutions combine the Network as a Service (NaaS) component and Security as a Service (SaaS) component into a single cohesive solution.

Continue reading

Watch Windows 12 being installed

Windows-12-main

There's been a lot of talk about Windows 12, Microsoft's inevitable successor to Windows 11. Two months ago, my colleague Sofia Wyciślik-Wilson reported on Microsoft's plans for that future OS here.

We've also seen some hints about it tucked away in Windows 11.

Continue reading

How likely are you to be a victim of identity theft?

identity individual crowd

It's human nature to have an, 'it can't happen to me' approach to life's mishaps, whether it's being involved in a traffic accident or falling victim to cybercrime.

But of course these things do happen to someone. When it comes to identity theft, Home Security Heroes has taken a more scientific approach to determining how likely you really are to become a victim.

Continue reading

TP-Link bolsters Wi-Fi 7 offerings with Deco BE85 Mesh System and Archer BE800 Router

Archer_BE800

Today, TP-Link launches two new exciting Wi-Fi 7 devices -- the Deco BE85 Mesh Wi-Fi system and the Archer BE800 Wi-Fi Router. These cutting-edge home networking products are deigned for enthusiasts that demand the best.

The Deco BE85 Mesh Wi-Fi system utilizes the latest Wi-Fi 7 technology, delivering remarkable speeds of up to 22 Gbps across three bands. With the inclusion of 4K-QAM and a widened 320 MHz channel, users can experience unparalleled performance. The system's MLO compatibility allows devices to connect to multiple bands simultaneously, ensuring a seamless multi-gig Wi-Fi experience on smartphones, laptops, and other devices.

Continue reading

Deepfake content rises 900 percent

DeepFake Artificial intelligence abstract human 3d face

The number of deepfake videos online is increasing at an annual rate of 900 percent according to the World Economic Forum.

In the light of this Kaspersky researchers have revealed the top three fraud schemes using deepfakes that people should be aware of.

Continue reading

Is this the year we take quantum threats seriously? [Q&A]

quantum computing

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

Continue reading

Brave is gaining 'Forgetful Browsing' to dramatically improve online privacy protection

Forgetfulness

Web browser Brave has long had a focus on privacy, making it the browser of choice for those with concerns about online tracking and the like. Although Brave may be regarded as one of the most private browsers available, its developers continue to work on new innovations; the latest is Forgetful Browsing.

This new feature makes it possible to always clear cookies and other storage when a site is closed, helping to eliminate the potential for tracking and bringing other benefits. Forgetful Browsing can be enabled on a site-by-site basis, or applied across the board, and it prevents sites from using trackers to identify you, bypasses article viewing limits, and ensures that you are logged out of sites when you leave them.

Continue reading

Is anyone using the Preview pane in File Explorer?

Preview-pane

Windows’ default file management tool, File Explorer, has a preview pane. Windows users may toggle it with the keyboard shortcut Alt-P or the selection of View > Preview Pane.

It displays previews of supported file types. If you select an image in the main pane, a thumbnail of that image is displayed in the preview pane.

Continue reading

Data: The once coveted resource that has become tricky to extract value from

Data Stream

Traditionally, oil has been the metaphor of choice when discussing the value of data. Like oil, data has been considered a coveted resource that governs the modern world. This is why organizations around the globe preserve vast stores of data even when it has no immediate value. Companies hold onto the asset with the belief that they will call upon it at some point in the future.

But alas, this comparison has become a poor fit in recent times. Data has become risky, expensive to store, hard to extract value from, and a desirable target for adversaries. More businesses are now realizing that data banks bear more in common with the valuable, although hard to extract value from, and dangerous, uranium.

Continue reading

Microsoft reminds Windows 10 21H2 users about imminent end of service... and forced upgrades

Windows-10-21H2

No operating system is supported forever, and this is true of Windows 10. In fact, anyone using Windows 10 21H2 has just one month of servicing left.

As such, Microsoft has issued a reminder about the approaching end of service, giving users time to prepare. The company has also confirmed that anyone still running this version of Windows should expect to be automatically updated to a supported version of Windows.

Continue reading

The CISO's guide to choosing the right SIEM

CISO

In 2023, Chief Information Security Officer (CISO) continues to be an important role with a broad reach for securing every aspect of a business, their people and systems. The security team reporting to the CISO is responsible for protecting thousands of IT devices and systems dispersed across broad geographic areas from attackers who also may be anywhere on the planet. Additionally, modern infrastructures are dependent on sophisticated security technologies to monitor traffic and distinguish between normal, everyday activities and potentially malicious activity due to the ongoing threat of attacks.

The security information and event management (SIEM) tool is one of the security team’s most crucial. With a large market of SIEM vendors, the type of SIEM that CISOs decide to deploy is highly flexible and must be aligned to the business that the CISO protects. It’s important for CISOs to fully evaluate the business and their unique goals to develop the criteria they need in a SIEM.

Continue reading

Microsoft will launch the huge Windows 11 Moment 3 update this summer, but you can have it now!

Windows 11 laptop and mobile

With Windows 11 Microsoft has made major changes to the approach it takes to updating the operating system, not least of which is the idea of "Moment" updates being used to introduce new features.

We've already seen the release of Moment 1 and Moment 2 for Windows 11, and Microsoft is planning to release the eagerly anticipated Moment 3 in June. If this seems like too long to wait, there's a way to get the update right now and enjoy an update File Explorer, Taskbar changes, an improved Task Manager and much more.

Continue reading

Load More Articles