[ad_1]
The Tor Project has released a new bridge called WebTunnel, aimed at those trying to access the internet in regions with heavy censorship. In its blog post, the organization says, "the development of different types of bridges are crucial for making Tor more resilient against censorship and stay ahead of adversaries in the…
[ad_1]
Phishing has long been a popular vector for cybercriminals in order to coax valuable information out of victims - and 2023 was no different. A new report from email security firm Codefense has delved into the most common themes in email phishing attacks last year. The themes it assigned were based on the…
[ad_1]
So-called stream-jacking attacks are advancing at a worrying pace, according to new research from Bitdefender. The cybersecurity firm claims that is has been keeping an eye on the trend since October 2023, as high-profile YouTube accounts were hijacked "to conduct a myriad of crypto doubling scams." However, Bitdefender says this year has brought…
[ad_1]
NordVPN has added a new feature to its Threat Protection solution, which alerts uses to potentially dangerous applications. The vulnerability scanner can automatically check applications on Windows computers for security flaws and then alert the user so they can take action. It checks a database of known flaws in software and will detect…
[ad_1]
This could be the moment Apple fans have been waiting for. We're tracking all the best Black Friday mini PC deals, and finally, our favorite unit is at its lowest ever price. Yes, it might only be the 256GB model, but the Apple Mac mini M2 has price-dropped down from $600 to $500…
[ad_1]
The Google Play Store will now let users know if VPN services downloaded on the storefront have agreed to security audits from independent bodies. VPN apps that have been audited in accordance with Mobile App Security Assessment (MASA) guidelines (the brainchild of the App Defense Alliance (ADA)) will now have a badge next…
[ad_1]
A new worldwide spoofing campaign has been discovered, and it is thought to have extorted over $100 million from its victims already. Researchers at security firm CloudSEK say the scam involves the impersonation of over a thousand companies, and is affecting over 100,000 people across more than 50 countries. They also say that…
[ad_1]
From its humble beginnings as a one-man project from a basement in Valley Forge, Pennsylvania, DuckDuckGo has grown to become one of the most respected privacy focused browsers in the world. Starting as a search engine, its aim from the outset was to challenge the dominance in the space by the likes of Google…
[ad_1]
If you thought using a longer password is better for your security than a short one, then you may want to think again. New research from Specops Software has found that even passwords 15 characters long make it into the top ten of the most common password lengths to be compromised (placing eighth).…
[ad_1]
X, the social network formerly known as Twitter, has a new way for paying subscribers to verify their account in an effort to prevent account impersonation and spoofing. By sending photos of themselves and their government-issued IDs to the microblogging site, paid users will also get preferential support - although the exact nature…