Visualistan: Cybersecurity -->

    Social Items

How businesses should be protecting themselves from cybersecurity threats in 2025

The cyber threats that businesses face today are deceptive, destructive, and targeted. They target large and small companies, exposing customers to financial damage and data theft. Nearly 88% of small business owners think their data is vulnerable to a cyberattack. With so many threats from all corners, the team at Ooma released a graphic packed with data on cybersecurity and tips on best practices.

How businesses should be protecting themselves from cybersecurity threats in 2025

30 statistics about data breaches

Ooma’s collection of data breach facts and statistics exposes the human element of these cyberattacks. According to their graphic, 55% of data breaches were targeted malicious attacks by humans, while only 22% were due to human error, and 23% were due to system failure. Studies show that Microsoft Office applications suffered 69.1% of app attacks between 2021 and 2023. The software usually became vulnerable after employees clicked suspicious links or opened malicious attachments.

30 statistics about data breaches



Microsoft is officially rolling out Passkeys to users of Windows, Android, and iOS. The functionality, a replacement of traditional password, was first launched by Microsoft for Windows last year.

 

Passkeys have been readily adopted by companies like Apple, Google, and others with the purpose of making it easy to sign into Gmail, iCloud, and other services. With Microsoft’s Passkeys, you can sign into a Microsoft account on an app or website, without having to type out a password.

 

To sign in with a Microsoft Passkey using a device, you can choose your personal authentication method like your face, fingerprint, PIN, or a security key. When you create your Passkey, two different keys are generated: one that is stored by the Microsoft website / app, and another being a private key that is stored on your device used for the authentication.

Microsoft is Bringing Passkeys to All Consumer Accounts



To help users understand the purpose and usage of all the security and safety tools in the app in one place and enhance their in-app experience, WhatsApp has created a new Security Hub mini site. The hub provides an overview of WhatsApp’s default safety and security features, as well as control options that significantly contribute to users’ account and data security.

 

Some of WhatsApp’s integral security features include default privacy, automatic spam detection, and proactive security alerts.

 

The mini site educates users on how to avoid scamming, spamming, and malicious acts like data theft that commonly occur across the platform. “Malicious actors and hostile states routinely challenge the security of our critical infrastructure,” says the company.

WhatsApp Launches a New ‘Security Hub Mini Site’ to Guide Users through All Security and Safety Tools Available in the App



Google recently equipped its Authenticator app with the ability to sync codes as part of the two-factor authentication process. Soon after, people began raising concerns over insufficient security, since the update could make it easy for hackers to gain access to Google accounts. In response, Google product manager Christiaan Brand revealed that the company plans to add end-to-end encryption in Authenticator.


Google Plans to Bring End-to-End Encryption to its Authenticator App



Google has finally updated Google Authenticator with support for cloud syncing for both Android and iOS devices. The platform’s latest policy allows users to sync their two-factor authentication codes to Google accounts. This is meant to make the process of logging into a Google account easier when setting up a new phone or retrieving an account from another device in case of losing a phone.

 

The tech giant decided to add cloud syncing to Authenticator after receiving feedback from users that suggested “complexity in dealing with lost or stolen devices that had Google Authenticator installed.” Up until now, users have had to deal with losing their ability to sign in to a service where they had set up 2FA via Authenticator, in case of losing their device.

Google Authenticator App Now Offers the Option to Sync Verification Codes Across Devices



PayPal announced a new log-in system ‘Passkeys’ some time back, and is now rolling it out on its website for Android users. The company also launched passkey support for Apple devices last year. To access Passkeys on PayPal’s website, users must have Chrome on Android 9 or above.

 



Switching your log-in system to Passkeys will not result in your password being removed from PayPal, as it would still be required to log in on unsupported devices. 

Android Users Can Now Log in to PayPal Using Passkeys



Reverse engineers Simon Aaarons and David Buchanan discovered a security flaw within the Google Pixel’s default screenshot editing tool ‘Markup’, which has been found to have first appeared five years back when the tool was first launched. The bug, which has been named “aCropalypse,” has caused screenshot images to become partially “unedited,” which has also resulted in hidden personal information being exposed online.

 

According to Aaarons and Buchanan, the occurrence of the flaw was possible because Markup doesn’t delete the original versions of the screenshots and saves them in the same file location as the edited ones. Moreover, if the edited screenshot file is smaller than the original, it causes the trailing portion of the original file being left behind, after the new file is supposed to have ended.

The ‘ACropalypse’ Bug Within Markup in the Google Pixel Puts Edited Screenshots Shared Online at Risk



Mental health platform Cerebral claims to have accidentally shared its user data with third-party advertisers including big companies like Meta, Google, TikTok and others. The leaked data contains significant details of Cerebral’s users, including their names, phone numbers, insurance information, email addresses, IP addresses, birth dates, appointment dates, treatment information, and more. 

 

Cerebral further revealed that the accident could have possibly resulted from the tracking tools that it has been using, and more specifically the bits of code embedded in its app from the third party advertisers. These have allowed Cerebral to measure how its users engage with ads on its platform, while giving advertising platforms access to user information.

Cerebral Confirms Having Accidentally Exposed Private User Data to Advertising Companies



Instagram has launched a new recovery center that is aimed at helping users retrieve their profiles after being logged out of their accounts due to hacking, forgetting password, losing access to two-factor authentication or account being disabled.

 

The recovery center can be accessed from https://www.instagram.com/hacked/, which provides a step-by-step guide of the process of getting an account back. In addition to that, users will also be able to refer to any two of their Instagram friends, so as to confirm their identity in case of being locked out of their account.

 


Instagram Rolls Out New Security Features Including a Recovery Center to Help Retrieve Locked Accounts



Google had been testing a new password-free secure login feature ‘Passkeys’ since October and launched it earlier this week to its Chrome Stable M108. Passkeys are a form of unique identity of a user without involving passwords. They can be stored on computers, phones or even USB security keys.

 


Chrome users can now access Passkeys within the browser on both desktop and mobile devices that have Windows 11, macOS, or Android installed. Additionally, Android users can sync their Passkeys between their Android device and  another device via a password manager directly or with support from a third-party, such as 1Password or Dashlane. Passkeys are designed using public key cryptography, which is what creates the cross-platform feature.

Google Launches Passkeys as an Alternative to Passwords in Chrome

Cybercrime Likely To Go Up in Coming Years


The Cyber Crime Magazine defines Cybercrime as the “damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, and post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.”


Cybercrime Likely To Go Up in Coming Years #Infographic

Subscribe Our Newsletter