Fri.Mar 07, 2025

article thumbnail

Grab four Apple AirTags for only $70 at Amazon right now

Collaboration 2.0

Right now, grab a four-pack of Apple AirTags for only $70 to help the iPhone user in your life monitor their keys, wallet, luggage, and more.

289
289
article thumbnail

Feds Link $150M Cyberheist to 2022 LastPass Hacks

Krebs on Security

In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass in 2022.

Passwords 254
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Android phone will run Debian Linux soon (like some Pixels already can)

Collaboration 2.0

Google introduces Debian Linux terminal app for Android. My phone's a laptop at last!

279
279
article thumbnail

A Brand New Botnet Is Delivering Record-Size DDoS Attacks

WIRED Threat Level

Eleven11bot infects webcams and video recorders, with a large concentration in the US.

Security 163
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

How to delete your personal info from Google Search - quickly and easily

Collaboration 2.0

Does searching for your phone number or name turn up lots of personal info about you on Google? Here's what you can do about it.

IT 268

More Trending

article thumbnail

Got a suspicious E-ZPass text? It's a trap - how to spot the scam

Collaboration 2.0

E-ZPass phishing texts seem to be hitting everyone - even non-drivers. Here's what to watch for and what to do if you receive one.

Phishing 250
article thumbnail

US Feds Take Down Garantex, Indict Operators

Data Breach Today

Russian cryptocurrency exchange Garantex, a money laundering destination for Russian and North Korean hackers, is no more after international law enforcement seized its servers. Prosecutors in the United States indicted the exchange's two principals in federal court.

IT 147
article thumbnail

Finally, a Windows 11 tablet rugged enough for play and strong enough for work

Collaboration 2.0

From brutal drops to icy cold and muddy messes, this rugged tablet shrugs off the elements and keeps going strong.

247
247
article thumbnail

How AI in Healthcare Can Speed Up Cyber Response

Data Breach Today

Artificial intelligence-based tools are among the most promising advancing technologies for healthcare sector organizations to help to address cybersecurity resource shortages, said Chris Tyberg, CISO of medical device and consumer health product manufacturer Abbott.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Forget the new Siri: Here's the advanced AI I use on my iPhone instead

Collaboration 2.0

With Apple's revamped assistant officially delayed again, Google and OpenAI can step in to upgrade your iPhone's AI experience.

246
246
article thumbnail

Reshaping Healthcare - and Healthcare Cyber - With AI

Data Breach Today

The use of artificial intelligence is not only reshaping healthcare delivery in the sector but also healthcare cybersecurity within organizations, said Anahi Santiago, CISO of ChristianaCare, the largest healthcare delivery organization in the state of Delaware.

article thumbnail

I tested the LG G5 OLED with Samsung and Sony models - Primary RGB Tandem is the real deal

Collaboration 2.0

Is it too early to hop on the four-stack OLED panel hype train?

IT 241
article thumbnail

Software Will Become Agentic and the Security Lessons We Need To Learn

KnowBe4

Ever since OpenAI publicly released ChatGPT in late 2022, people have been predicting the end of programmers.

Security 113
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Tax scams are getting sneakier - 10 ways to protect yourself before it's too late

Collaboration 2.0

Almost half of people polled by McAfee say they or someone they know has received a text or phone call from a scammer pretending to be from the IRS or a state tax agency.

IT 241
article thumbnail

Your KnowBe4 Fresh Content Updates from February 2025

KnowBe4

Check out the 58 new pieces of training content added in February, alongside the always fresh content update highlights, new features and events.

article thumbnail

Gemini AI is coming to Google Calendar - here's what it can do and how to try it

Collaboration 2.0

Gemini can now add events to your calendar, give you event details, and help you find an event you've forgotten about.

IT 237
article thumbnail

Warning: Ransomware Threats Increased Fourfold in 2024

KnowBe4

Researchers at Barracuda observed a fourfold increase in ransomware threats last year, driven by increasingly sophisticated ransomware-as-a-service (RaaS) operations.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

10 tiny gadgets I carry with me everywhere - and you might want to, too

Collaboration 2.0

If you love gear that's both useful and affordable, these gadgets make great gifts without stretching your budget.

232
232
article thumbnail

Rayhunter: Device to Detect Cellular Surveillance

Schneier on Security

The EFF has created an open-source hardware tool to detect IMSI catchers: fake cell phone towers that are used for mass surveillance of an area. It runs on a $20 mobile hotspot.

IT 94
article thumbnail

This OTC glucose monitor encouraged me to change my eating habits - here's how

Collaboration 2.0

Abbott's Lingo is a continuous glucose monitor that works with an iPhone app to provide insight into your body's glucose levels.

223
223
article thumbnail

Invoice or Impersonation? 36.5% Spike in Phishing Attacks Leveraging QuickBooks’ Legitimate Domain in 2025

KnowBe4

A KnowBe4 Threat Lab Publication Authors: Martin Kraemer, James Dyer, and Lucy Gee Much like sending a phishing email from a compromised account, cybercriminals can boost the deliverability and credibility of their attacks by leveraging legitimate platforms.

article thumbnail

10 Ways to Leverage Buyer Signals and Drive Revenue

In today’s ultra-competitive markets, it’s no longer enough to wait for buyers to show obvious signs of interest. Instead, sales teams must be proactive, identifying and acting on nuanced buyer behaviors — often before prospects are fully ready to make a purchase. In this eBook from ZoomInfo & Sell Better, learn 10 actionable ways to use these buyer signals to transform your sales strategy and close deals faster.

article thumbnail

They said I could bring this TSA-approved multitool on a plane - here's how that went

Collaboration 2.0

I really missed having a multitool while traveling, so I was intrigued by the promise of one that claimed to be TSA-approved.

222
222
article thumbnail

Russian DDoS Groups Frothing After Europe Backs Ukraine

Data Breach Today

Self-Described Hacktivists Appear to Remain Moscow Foreign Policy Extension Russia's use of high-profile online nuisance attacks as a psychology ploy designed to amplify Moscow's geopolitical agenda continues. As Europe has rallied to support Ukraine, self-proclaimed Russian hacktivists have trumpeted their targeting of the U.K. and EU member states, instead of the U.S.

272
272
article thumbnail

My new favorite travel accessory puts every other charger to shame - and it's cheap

Collaboration 2.0

Nomad's ChargeKey Version 2 provides all of the benefits of the previous model but now has faster charging and data transfer speeds.

IT 220
article thumbnail

Are Efforts to Help Secure Rural Hospitals Doing Any Good?

Data Breach Today

Biden-Era Cyber Aid Programs Are Still Available, But Future is Uncertain Even though rural hospitals and other small healthcare providers don't have deep pockets, cybercriminals continue to target them with ransomware, often causing serious disruption and compromises affecting large swaths of patients. What can be done to help them strengthen cybersecurity?

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

12 Android phone settings you should change to dramatically increase battery life

Collaboration 2.0

Maximizing your Android's battery life doesn't have to be a mystery. Use these 12 proven tips to make every minute of power count.

217
217
article thumbnail

Friday Squid Blogging: Squid Loyalty Cards

Schneier on Security

Squid is a loyalty card platform in Ireland. Blog moderation policy.

81
article thumbnail

I spent $4K on my Mac Studio 3 years ago - should I upgrade to the 2025 model?

Collaboration 2.0

I've been waiting for Apple's new Mac Studio, and now it's here. But is it worth the upgrade? Let's break it down.

IT 213