article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 139
article thumbnail

Court Tells Bolsonaro He Can't Force Social Media Companies to Leave Up His Posts

Gizmodo

Brazilian president and hiccuping body horror exhibit Jair Bolsonaro’s gamble to force social media companies not to delete his or his supporters’ awful posts has failed. Read more.

Media 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

U.S. Energy Company Targeted by QR Code Phishing Campaign

SecureWorld News

energy company, as well as organizations in other industries, such as finance, insurance, manufacturing, and technology. A blog post from Cofense , which spotted the campaign, further details the scam, particularly the one aimed at the energy company. Keep operating systems and software up to date.

Energy 76
article thumbnail

Bungie’s war on cheat companies continues with another lawsuit

GeekWire

So far this year, it’s taken three separate companies to court and won, on charges of making hacks for Destiny 2, the most recent of which was the Indian company Lavicheats in May. Bungie’s war on cheat companies continues with another lawsuit by GeekWire on Scribd million in damages.

Company 83
article thumbnail

Cops Want More of Our Social Media Data Than Ever Before

Gizmodo

Law enforcement doesn’t have much trouble getting access to data from social media companies. In fact, over the first half of last year, authorities in the US made close to 118,000 requests for user information from tech companies—a number that’s more than twice the number of requests thrown at these companies since… Read more.

Media 79
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

Attackers use deepfake ID documents to fool KYC processes or inject deepfake photos and videos to spoof facial biometrics systems. A prime example is the recent attack that injected an AI deepfake video feed to defraud a Hong Kong company for $25 million. Artificial Intelligence, Security

Security 115
article thumbnail

‘X,’ rated: Twitter’s new branding is called a rip-off and worse as bird goes bye-bye

GeekWire

(Image via X) X now marks the spot where Twitter’s blue birdie used to be, as Elon Musk rebranded the social media company he owns. Musk’s X appears to be the same as that used for the X Window System, “a windowing system for bitmap displays, common on Unix-like operating systems,” as Wikipedia puts it.

Windows 91