Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Random but Memorable - Episode 11.0: Fancy Bear Grunge Nostalgia with Scott J. Shapiro

It’s the final episode of the season! Join us for one last action-packed show as we break down all the latest security news in Watchtower Weekly and get nostalgic with a 90s-themed game of Play Your Passwords Right. 💿��🎮🎶 We’re also lucky enough to be joined by Scott J. Shapiro, author of the latest cybersecurity true-crime novel Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. Tune in to find out more about some of history’s most astonishing cyberattacks and what we can learn from them.

How to Keep Your Data Safe Online

There are risks associated with providing your confidential information online, but it’s necessary in a modern world that requires Personally Identifiable Information (PII) to create accounts, purchase goods online, complete your taxes or receive a paycheck. Your data could become vulnerable through no fault of your own. Data breaches are common, and your account information could get leaked. If your data is intercepted by threat actors, it could be sold to cybercriminals on the dark web.

KeeperPam Overview

KeeperPAM was created to fully protect perimeterless and multi-cloud environments with just the features you need. Keeper's patented PAM solution enables organizations to achieve complete visibility, security, control and reporting across every privileged user on every device in your organization. The platform enables zero-trust and zero-knowledge security and compliance by unifying three integral products into one SaaS platform with limited IT staff required.

Smishing vs. Vishing: What's the Difference?

The main difference between smishing and vishing is that smishing is a phishing attack that uses SMS text message as the contact method and vishing uses voice calls as the contact method. Research conducted by the FBI’s Internet Crime Complaint Center (IC3) found that phishing, including vishing and smishing, is the most prevalent cyberthreat in the U.S. The report found that in 2022, 300,497 people reported falling victim to phishing, resulting in reported losses totaling up to $52,089,159.

How to Stay Safe While Online Gaming

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated. Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games.

Passkeys in iOS 17: Watch a sneak peek at what's coming to 1Password for iOS

We’re always captivated by WWDC, Apple’s annual developer conference, and the announcements shared during its keynotes and various breakout sessions. This year’s conference was particularly exciting because Apple unveiled a new passkey API that will be implemented in iOS 17. The API will enable password managers like 1Password to create and use passkeys inside any native app that has added passkey support, including Safari.

What is Elliptic Curve Cryptography?

Elliptic Curve Cryptography (ECC) is a form of public-key cryptography that is based on the mathematics of elliptic curves. It provides a secure way to perform cryptographic operations such as key exchange, digital signatures and encryption. ECC is an alternative to Rivest-Shamir-Adleman (RSA) encryption, which was first released in 1977. Continue reading to learn more about elliptic curve cryptography and why it’s considered the most secure form of encryption.

Now in beta: Save and sign in with passkeys using 1Password in the browser

Last year, we joined the FIDO Alliance and committed to building safer, simpler, and faster login solutions for everyone. Today, we’re taking a major step forward and announcing that passkey support has started to arrive in 1Password. Using the public beta versions of 1Password in the browser, you can now save and sign in to online accounts with passkeys.