Amazon is killing a privacy feature
Everything you say to your Echo will be sent to Amazon starting on March 28. Why so much “surveillance”? Since Amazon announced plans for a generative AI version of Alexa,…
Your Go-To Source for Cyber Security Insights and Solutions
Everything you say to your Echo will be sent to Amazon starting on March 28. Why so much “surveillance”? Since Amazon announced plans for a generative AI version of Alexa,…
A critical vulnerability in YouTube’s infrastructure allowed attackers to expose the email addresses tied to anonymous channels by combining flaws in Google’s account management system and an outdated Pixel Recorder…
OAuth, short for Open Authorization, is an open standard protocol used for secure authorization. It allows users to grant third-party applications limited access to their resources without sharing their credentials,…
An insider threat is a security risk posed by an employee, former employee, contractor, or vendor. Insider threats can result in fines, reputational damage, and loss of intellectual property. What…
An RSA token keyfob, often called an RSA SecurID token, is a hardware device used for two-factor authentication (2FA). Here’s how it works: The RSA token keyfob is a small,…
Unauthorized data transfer, or data exfiltration, is a significant threat to organizations. Learn how data exfiltration happens and essential strategies to prevent it. What is data exfiltration? Data exfiltration is…
The data breach at the debt collection agency Financial Business and Consumer Solutions (FBCS) was much bigger than initially thought. After first reporting some 1.9 million victims, the company now…
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
With two-factor authentication (2FA), users must prove their identity through two different means before being granted access. What is two-factor authentication? Two-factor authentication, abbreviated as 2FA, is an authentication process…
Personal information is any information that can identify a person, from someone’s name and address to their device identifier and account number. What is personal information or personal data? Personal…