The "Linux Threat Report 2021 1H" from Trend Micro found that Linux operating systems are heavily targeted for cyberattacks, with nearly 13 million detections in the first half of this year. As organizations expand their footprint in the cloud, correspondingly, they are exposed to the pervasive thre...

Reports of a data breach of TurboTax have been overblown, according to Intuit which owns the tax preparation platform. Several news outlets recently reported that an unspecified number of TurboTax accounts were compromised in a wave of credential stuffing attacks. Those kinds of attacks exploit cred...

DuckDuckGo has announced an add-on to the Chrome browser that blocks Google's new scheme to provide marketers with information for targeting advertising at Internet users. The scheme called FLoC -- Federated Learning of Cohorts -- is being tested in Chrome, in some cases without the knowledge of th...

OPINION

The Evolving Future of the Office

I participated in a group analyst event several weeks ago about companies converting their offices into collections of meeting rooms. We couldn't picture people who have been meeting remotely for so many months suddenly concluding that the long commute to and from the office was worth meeting in per...

Google sent a shock wave through the advertising and publishing industries last year when it announced it planned to scrap third-party tracking cookies, which are an important tool for online marketers. Not to worry, the company announced Monday. It has a viable alternative in the wings. "FLoC" will...

A Mini Browser War in Linux

Two new Web browsing alternatives widen the field of browser choices for Linux users. The recent introduction of Microsoft Edge for Linux, and the Dec. 8 release of Vivaldi version 3.5 offer the freedom to experience a Google-free vehicle to navigate the Internet. Edge on Linux has the potential for...

OPINION

A Momentous Week for 4 Tech Vendors

Powerful events and product launches by Cisco, Lenovo, Microsoft, and Qualcomm promise to make our future brighter. From more effective courts and legislators, to flexible and intelligent robots, to tools we can use to improve remote productivity, to validation that our justice system works -- last ...

Zoom gave its users a big security upgrade Monday when it rolled out end-to-end encryption for its online meetings network. E2EE puts control of the keys for scrambling data in the hands of meeting organizers. Before the E2EE rollout, encryption was done on Zoom's servers, where someone with access ...

Welcome to the new phenomenon of playing Zoom poker. It is a novel idea that is catching on as the pandemic continues. The video platform has become a popular solution for friends who miss their regular in-person poker games. It adds the missing element of banter and social interactions that playing...

Users of video conference tools should be aware of the growing risk of impersonation attacks. Cybercriminals are capitalizing on the exponential increase of users turning to Zoom and other platforms to collaborate across work and friend networks. Researchers have identified attacks stemming from Au...

The Department of Homeland Security, through its Science & Technology Directorate, has released a web app to help predict the decay rate of coronavirus in the air. The tool, entitled "Estimated Airborne Decay of SARS-CoV-2," accounts for the ambient temperature, relative humidity, and UV index i...

A browser that has received plaudits for privacy protection has been exposed for redirecting Web searches to make money. Brave, a browser with some 15 million monthly users, has been redirecting searches for cryptocurrency companies to links that produce revenue for the browser's owners through adve...

HOW TO

Back to the RSS Future

For understandable reasons, people feel worn down by the volume and composition of the media coming at them. This fatigue stems from a few compounding factors. There is a strong perception that the character of the information presented by the media is warped by highly polarized players. Nearly two-...

Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversa...

Which most influences your decision to accept a LinkedIn invite from a stranger?
Loading ... Loading ...

LinuxInsider Channels