proactive cybersecurity vs reactive threat hutning

Proactive Vs reactive: why you need to take a proactive approach to cybersecurity

Alongside the development of the world, organizations have started to interface more of their processes to the cyberspace. A company’s reputation, intellectual property (IP), staff, and customers are at risk of being compromised. To properly protect their assets, enterprise businesses need a solid cybersecurity strategy installed. New threats are emerging regularly; estimations show 300,000 new…

Zoom Logo, wallpaper

Zoom Full Story: All the Controversies Surrounding the Popular Video Chat app

The controversial app Zoom has been making headlines in the cyber world recently. The app has become quite popular since the COVID-19 outbreak started; however, the security of the app is questioned as it has been recently making headlines in cybersecurity news numerous times. Videoconferencing software company Zoom provides an online communication platform for audio…

Apple Safari

Apple Safari Updated to Block Third-Party Cookies

Apple on Tuesday released Safari 13.1 and updated the Intelligent Tracking Prevention (ITP) privacy feature. Intelligent Tracking Prevention allows Safari to block cookies and prevent advertisers from snooping on users’ web habits. According to Apple WebKit engineer John Wilander, Safari now blocks all third-party cookies. (WebKit is the browser engine that powers Safari.) That means that…

Facebook and LinkedIn demand Clearview stop scraping images

Facebook and LinkedIn demand Clearview stop scraping images

Facebook and LinkedIn demand Clearview stop scraping images. Twitter has sent a cease-and-desist letter to facial recognition startup Clearview AI over unauthorized photo scraping. A cease-and-desist letter is sent to an individual or a company to stop any unauthorized activity and to not restart it. “Scraping people’s information violates our policies, which is why we’ve…