Wednesday, October 23

Tag: cybersecurity

CHATGPT Enhances Data Privacy with New Chat History Control Feature, Ensuring User Confidentiality

CHATGPT Enhances Data Privacy with New Chat History Control Feature, Ensuring User Confidentiality

News
In an era where data privacy is a paramount concern, ChatGPT has taken a significant step forward by introducing a groundbreaking feature that allows users to turn off chat history. This new capability empowers individuals to exert greater control over their conversations and safeguard their privacy. However, it is important to note that previously saved conversations will still be accessible to AI models, as they were recorded before the implementation of this feature. Let's delve into the details of this latest development and explore its implications for user confidentiality. Protecting User Privacy: Understanding the importance of user privacy, ChatGPT's latest update brings the ability to disable chat history, giving users peace of mind regarding the storage and access of thei...
5 Cybersecurity Woes that Pose Threats to Digital Growth

5 Cybersecurity Woes that Pose Threats to Digital Growth

Articles
In today’s digital landscape cybersecurity has emerged as a critical concern where technology plays a central role in our lives. This increasing digital platform dependence has escalated new avenues for cybercriminals, making it imperative for individuals and organizations to be aware of potential threats. Here are 5 cybersecurity challenges that pose significant risks. Phishing attacks: Phishing attacks continue to be one of the most prevalent cyber threats. Cybercriminals employ deceptive tactics, such as impersonating trusted entities or creating fake websites, to trick individuals into revealing sensitive information. These attacks compromise personal data and jeopardize the security of entire organizations. Vigilance and awareness are essential to combat such attacks. ...
Cyber Security Risks of .zip and .mov Domains – Insight by Umair Aziz

Cyber Security Risks of .zip and .mov Domains – Insight by Umair Aziz

Articles, Cyber Insight
In a significant development, Google has recently made .mov and .zip domains available for public purchase. While this move brings exciting possibilities for website owners and businesses, it also introduces potential cybersecurity concerns. In this article, we will explore the implications of these new domain extensions and discuss the controls that companies should consider implementing to detect and prevent malicious attempts. Umair Aziz, Head of Information Security and IT Governance - SadaPay Cyber Security Implications Increased Phishing and Malware Attacks: The introduction of .mov and .zip domains provides attackers with new avenues to distribute phishing emails and deliver malware. Cybercriminals can now craft convincing emails that appear to contain multimedia files...
Twitter Launches Encrypted DMs for Verified Users with Potential Security Drawback

Twitter Launches Encrypted DMs for Verified Users with Potential Security Drawback

News
Twitter has finally launched its long-awaited encrypted direct messaging feature for verified users, including those who subscribe to Twitter Blue and belong to a "Verified Organization." However, this exclusivity has left privacy-focused users disappointed, as the feature has some significant limitations. One such limitation is that both parties must be verified to have an encrypted chat, which could exclude a large portion of Twitter users. It has been reported that Twitter has not clarified whether this restriction will remain in place or be lifted in the future. Additionally, the encrypted messaging feature does not support group messages and can only handle links, not media files. Moreover, Twitter has not provided a direct way to report encrypted messages. Instead, users a...
Dark Web Exhibits Cybercrime Jobs Online

Dark Web Exhibits Cybercrime Jobs Online

News
Cybercrime groups are increasingly operating like businesses, and are even advertising jobs on the dark web that offer competitive salaries, paid time off, and other benefits. This approach to cybercrime enables these groups to attract and retain talented developers and hackers and to operate more efficiently and effectively. This indicates that cybercriminals are becoming more organized and sophisticated, making it increasingly challenging for security forces to pin down and disrupt these groups. Cybercrime groups are seeking to fill a variety of roles, beyond just hackers and developers. Some of these roles may include data analysts, malware and tool developers, initial compromise actors, reverse engineers, website and phishing email designers, malware testers, and IT administ...
NCR Datacenter Hit by Ransomware Attack, Payment Services Disrupted

NCR Datacenter Hit by Ransomware Attack, Payment Services Disrupted

News
NCR, a major provider of payment services, is currently dealing with a ransomware attack that has affected its systems. The attack has caused an outage in one of its data centers and impacted the functionality of its Aloha point-of-sale system used by restaurants and Counterpoint management system used by retailers. While the investigation into the attack is ongoing, NCR has stated that none of its ATMs, digital banking, payments, or other retail products have been affected. The company has notified its customers of the incident, engaged external experts for support, and is working to restore impacted data and applications while enhancing its cybersecurity protocol. Some customers may have reduced capabilities on affected cloud-based Aloha and Counterpoint functionality, but in-...
Transforming End User Behavior, An exclusive interview with Syed Abid Ali, Co-Founder & CCO at PhishRod

Transforming End User Behavior, An exclusive interview with Syed Abid Ali, Co-Founder & CCO at PhishRod

Channel, Interviews
People, processes, and technology are the foundations of any organization. All the information that an organization possesses revolves around these three pillars. Whether you are developing the digital transformation plan or the cybersecurity strategy of the organization, people, processes, and technology are vital components. With the advent of technology and the internet being the nucleus of digital growth, it is critical that controls are in place at all levels within the organization to safeguard confidential data. The role of people in the cybersecurity equation has become even more critical, as hackers are targeting end users’ using techniques such as phishing and social engineering. In an exclusive interview with CyberCentric, Syed Abid Ali, Co-Founder & CCO at PhishRod high...
The Growing Threats to Cybersecurity: How to Protect Your Business in a Changing Landscape

The Growing Threats to Cybersecurity: How to Protect Your Business in a Changing Landscape

Articles
In today's interconnected world, businesses face a constantly evolving array of cyber threats. Cybercriminals are becoming increasingly sophisticated in their tactics, using a range of methods to exploit vulnerabilities in corporate networks, steal sensitive data, and disrupt business operations. One of the most significant cybersecurity threats is the rise of ransomware attacks. Ransomware is a type of malicious software that encrypts a victim's files, rendering them inaccessible, and demands payment in exchange for a decryption key. The number of ransomware attacks has been growing rapidly in recent years, with some estimates suggesting that the total cost of ransomware to businesses in 2021 exceeded $20 billion. Another major cybersecurity threat is the increasing prevalence ...
Cyber-Security Risks on TikTok: What You Need to Know to Stay Safe

Cyber-Security Risks on TikTok: What You Need to Know to Stay Safe

Articles
TikTok has become a global phenomenon and has gained immense popularity among the younger generation. However, the app has faced several security concerns in recent times, ranging from data privacy breaches to content moderation issues. The company has been taking various measures to address these concerns and ensure that the app remains safe and secure for its users. TikTok has implemented several features, including machine learning algorithms and human moderators, to detect and remove harmful content from the platform. Additionally, the app has also taken steps to safeguard user data by implementing data encryption and limiting data access to authorized personnel only. Despite these efforts, TikTok continues to face scrutiny and criticism from various quarters, highlighting t...
PhishRod adds 5 stand out features to stay ahead of the competition

PhishRod adds 5 stand out features to stay ahead of the competition

Articles
As a leading anti-phishing solution in the region, PhishRod is constantly evolving to provide prompt threat detection, awareness training, and compliance to elevate the cyber-secure culture in an organization and transform end-user behavior. To continue value addition for our customers and gain a competitive advantage, PhishRod has launched the following new exciting features. Machine Lock Integration While implementing security awareness, one of the biggest challenges faced by organizations is the negligence of end users towards the awareness material shared with them. It remained at their disposal, often unread for ages. To counter this issue, PhishRod has launched Machine Lock Integration, which after a certain duration, automatically locks the systems of end users who fai...