I tested a subscription-free video doorbell that rivals Ring – and it's better in some ways

I tested a subscription-free video doorbell that rivals Ring – and it's better in some ways

ZDNET’s key takeaways The Eufy Security Video Doorbell E340 is normally available for $180 but is currently on sale. This doorbell features two cameras to give you complete visibility of the person at your door and any packages left on your porch, all with no monthly fees. Although the doorbell comes with 8GB of built-in local storage (enough for up to 60 days of event recordings), you need to add a Eufy Security HomeBase to…

Read More

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

Cybercriminals Expand Use of Lookalike Domains in Email Attacks

Cybercriminals have ramped up their use of lookalike domains to facilitate a variety of targeted email-based social engineering and financial fraud scams, according to a new report by BlueVoyant. These attacks are particularly challenging to detect and enable attackers to extend the types of organizations and individuals who are targeted in such scams. The researchers found that threat actors target a range of critical sectors via such domains, including finance, legal services, insurance and construction….

Read More

The plan to decentralize TikTok

The plan to decentralize TikTok

Beata Zawrzel/NurPhoto via Getty Images The fight over the future of TikTok’s US operations has been a rollercoaster, to say the least. In January, the Supreme Court upheld the decision to ban the app in the US because its Chinese owner, ByteDance, had failed to sell it to a US-based company. However, President Trump granted the company a 75-day extension to find a buyer.  Now days away from the new deadline of April 5, the popular short-video…

Read More

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

I switched to a high-end dumbphone for a week, and it put E Ink (and my iPhone) to shame

ZDNET’s key takeaways The Light Phone 3 is available now with support from many major carriers for $599. It’s setting a new standard for simplified phones by combining a sleek, minimal product with a focused purpose. I wish the battery lasted longer, there are still some features in development, and it’s not exactly cheap. Much attention has been paid to the idea of a “dumbphone.” We’ve all had the thought: how liberating it would be…

Read More

Author of the Month: Andrew Pattison – IT Governance Blog

Author of the Month: Andrew Pattison – IT Governance Blog

This month, we are celebrating author Andrew Pattison! His book: NIST CSF 2.0 – Your essential introduction to managing cybersecurity risks was published in February 2025 and covers the latest updates to the NIST framework.   The NIST CSF (Cybersecurity Framework) 2.0 is designed to help organisations prevent and protect themselves from cyber attacks. This book will help you understand how to: Begin implementing the NIST CSF 2.0 in your organisation; Build a cyber security…

Read More

In turbulent political times, IT can be a difference maker

In turbulent political times, IT can be a difference maker

The always-evolving global economy has become hyper-politicized. Despite the old line that the US government is, in all actuality, little more than a military attached to an insurance company, the seldom-of-the-same-mind three anchors on CNBC’s Squawk Box recently stated that they can’t talk about the economy without talking about American politics — specifically tariffs and White House/agency interventions. CEOs at Big Tech, Big Media, Big Agriculture, and Big Manufacturing and other important societal actors are…

Read More

Why no small business is too small for hackers – and 8 security best practices for SMBs

Why no small business is too small for hackers – and 8 security best practices for SMBs

PM Images/Getty Images I have given hundreds of cybersecurity-related webcasts and presentations, written hundreds of cybersecurity-related articles, and been involved in hundreds of one-on-one cybersecurity-related meetings with clients. Someone will always respond, comment, or protest that their business is too small for a hacker’s attention. Small target illusion But none of these folks understand the economics of a hack when it comes to small businesses. There isn’t a random guy out there who’s decided to…

Read More

Help! I clicked on a phishing link – now what?

Help! I clicked on a phishing link – now what?

ZDNET When you think of phishing emails, you probably think of the crude, grammatically flawed, easy-to-spot samples that go straight to your junk folder. I regret to inform you that those weak “spray and pray” campaigns are yesterday’s news. The crooks haven’t gotten smarter, but their tools have. Also: These phishing attacks are targeting Mac browsers – how to protect yourself With the help of generative AI, online scammers have become dramatically better at crafting and…

Read More

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms

Cyber Security and Resilience Bill Will Apply to 1000 UK Firms

A major new cybersecurity law set to come into force later this year will demand new compliance requirements of 1000 UK organizations, the government said today. The Cyber Security and Resilience Bill is the government’s long-awaited answer to the EU’s NIS2 – a new piece of legislation that builds on the European NIS Directive of 2016. The UK’s interpretation of that directive, known as NIS Regulations 2018, has been due an update for several years….

Read More

Japan Passes Active Cyber Defense Bill

Japan Passes Active Cyber Defense Bill

Over the past few years, many countries have made considerable efforts to bolster cybersecurity preparedness. These efforts are understandable when put into a geopolitical context: global relationships in the past five years have been among the most tumultuous in decades, cybersecurity threats are more sophisticated than ever, and the world is increasingly reliant on digital technologies. However, many of these cybersecurity preparedness efforts are remarkably alike, with most of them including risk management frameworks, incident…

Read More
1 185 186 187 188 189 4,346