Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Password Management

Is the Dark Web Dangerous?

Yes, the dark web is dangerous because numerous criminal activities take place on the dark web. There are also cyberthreats that are common on the dark web such as malware, a type of malicious software, that can be installed onto your device by a cybercriminal and used to steal your information. Read on to learn more about why the dark web is dangerous and how you can avoid having your information published on it.

What Is Business Email Compromise?

Business Email Compromise (BEC) is a targeted cyberattack in which a cybercriminal poses as a trusted figure, such as the CEO of a company, and sends out an email to specific individuals requesting sensitive information or money. BEC attacks involve research and preparation in order for the cybercriminal to develop a convincing impersonation. Continue reading to learn more about business email compromise and what organizations should do to prevent this type of attack.

How To Prevent Internet of Things (IoT) Attacks

Smart devices are amazing, and they make our lives easier. Smart light bulbs for your home allow you to change the color and schedule lights to turn on and off based on your activities. Internet-connected cameras allow us to monitor our homes with phone apps. Unfortunately, even a device as simple as a light bulb connected to your WiFi can be a gateway for cybercriminals to launch an attack. It happens, and it can happen to you.

Random but Memorable: People's Choice Bonus Episode

Surprise! We're back for a very short and sweet bonus episode. 🥳 🏆 We've been nominated for the 2023 People’s Choice Podcast Awards in the This Week in Tech – Technology category! You can help us win our first award – support the show by signing-up and voting for Random but Memorable today! 🏆 It would mean a lot to our team if you could spare a few minutes to vote.

What is Juice Jacking?

Juice jacking is a security exploit in which devices are compromised when plugged into an infected USB charging station, port or use an infected charging cable. This type of security exploit takes advantage of the fact that many people need to charge their devices, especially when traveling, and use the provided USB cables to do so. Apart from charging devices, USB cables are also used to sync data which is how attackers are able to take advantage and extract data from devices.

Seamless Integration Between Azure and Your Password Manager

Since its launch in 2010, Microsoft Azure has been deployed to millions of organizations worldwide. Azure offers a vast array of services, including virtual machines, databases, AI and machine learning tools, analytics, networking, and storage options. Due to the global popularity of these cloud services, Keeper Security has prioritized seamless integration with Microsoft Azure.

Why Do I Need a Password Manager if I Have iCloud Keychain?

If you use iCloud Keychain, you should switch to a dedicated password manager because it has superior security and more features to help you streamline password and data management. Password managers are cross-functional, allow you to securely share passwords, provide you with the ability to store more than just passwords and have secure add-ons available to further protect yourself. Continue reading to learn why you should use a password manager if you’re currently using iCloud Keychain.