5 ways to defend your phone against SIM swap attacks
In SIM-swapping, the criminal controls your phone using a different device. So the 2FA text message that would typically alert you to the thief’s presence never reaches you.
Suddenly, your phone doesn’t work. While you’re trying to figure out what’s wrong with it – without being able to make calls – the hacker is quickly digging through your apps and files, gorging himself on your private data and probably even your bank account information.
Tomorrow’s attacks today: How to defend against next-generation cyberattacks
Attacks today are often masked as valid data transmissions or come in as simple emails or messages, fileless attacks that take the form of queries that ask a user to take an action, which if initiated will unknowingly create a breach. This makes some of the latest attacks even more treacherous because they can unleash something that a company’s standard security software and hardware defensive measures fail to identify as malicious. Read more in
Artificial Intelligence For Good – Also Makes Business Sense
Artificial Intelligence (AI) has been put forward as a potential solution for many of the gravest problems facing society, from the opioid crisis to poverty and famine.

New Facebook Tool Let Users Transfer Their Photos and Videos to Google
Facebook has finally started implementing the open source data portability framework as the first phase of ‘Data Transfer Project,’ an initiative the company launched last year in collaboration with Google, Apple, Microsoft, and Twitter.
Facebook today announced a new feature that will allow its users to transfer their Facebook photos and videos to their Google Photos accounts—directly and securely without needing to download and reupload it