Small model, big impact: Patronus AI’s Glider outperforms GPT-4 in key AI benchmarks

Credit: VentureBeat made with Midjourney


Patronus AI launches Glider, a breakthrough 3.8B parameter language model that rivals GPT-4’s evaluation capabilities while running on-device, offering transparent AI assessment with detailed explanations for developers and enterprises.Read More

Security News | VentureBeat – ​Read More

US government urges high-ranking officials to lock down mobile devices following telecom breaches

The move to urge Americans to use end-to-end encrypted apps comes as China-backed gangs are hacking into phone and internet giants.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Cisco to Acquire Threat Detection Company SnapAttack

Cisco has announced its intention to acquire threat detection company SnapAttack to boost Splunk security product capabilities. 

The post Cisco to Acquire Threat Detection Company SnapAttack appeared first on SecurityWeek.

SecurityWeek – ​Read More

North Korea-linked hackers accounted for 61% of all crypto stolen in 2024

With the rising adoption and value of crypto assets, the potential for theft is also on the rise. This year, the total value of cryptocurrency stolen surged 21%, reaching a substantial $2.2 billion. And according to a Chainalysis report released on Thursday, more than half of this amount was stolen by North Korea-affiliated hacking groups. […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products 

Cyble | Cyber Resilience Act

Europe embarks on a new chapter in cybersecurity with the entry into force of the Cyber Resilience Act (CRA). This marks the first-ever EU legislation addressing cybersecurity across a broad range of digital products. The CRA will have far-reaching implications for everything from simple connected devices like baby monitors and smartwatches to more complex systems supporting critical infrastructure.  

With mandatory cybersecurity requirements imposed on manufacturers and retailers, the Act promises to make Europe’s digital space safer, fostering resilience against cyber threats. The Cyber Resilience Act introduces harmonized rules for products containing digital elements, aiming to ensure high levels of cybersecurity standards throughout their entire lifecycle. 

This means manufacturers and retailers must meet strict cybersecurity standards at every stage of the product’s journey—from design and production to maintenance and eventual disposal. The goal is to enhance transparency, reduce vulnerabilities, and strengthen overall security for products connected to or interacting with other networks and devices. 

The CRA’s requirements apply to all products with digital components, with a few exclusions such as medical devices and aviation equipment. By December 2027, any product sold in the EU containing digital elements will need to meet these cybersecurity standards and bear the CE marking, signifying compliance. The CE marking is a symbol that indicates a product meets EU safety and regulatory standards, and for the first time, it will also assure consumers that the product adheres to stringent cybersecurity measures. 

The Cyber Resilience Act (CRA) Will Impact All Economic Operators 

The CRA targets all economic operators placing products with digital components on the European market, meaning it applies to manufacturers, importers, and retailers. Some of the key factors of the act are:  

  • Additional Guidance for SMEs: Microenterprises and small businesses (SMEs) will receive extra guidance to help them comply with the Cyber Resilience Act (CRA) requirements. 

  • Flexibility for Member States: While the CRA sets minimum cybersecurity standards, Member States have the flexibility to enforce stricter regulations where necessary. 

  • Third-Party Assessments for High-Risk Products: Certain high-risk products, such as firewalls, intrusion detection systems, and cybersecurity tools, will undergo mandatory third-party assessments to ensure compliance with security standards, especially if they are critical to infrastructure or essential services. 

  • Open-Source Software Exemption: Open-source software is not subject to the same strict CRA requirements as commercial products. It is only regulated under the CRA when supplied for commercial use. 

  • Exemption for Non-Commercial Open-Source Software: Software developed by nonprofits or small businesses for non-commercial use is exempt from CRA requirements. 

  • Requirements for Commercial Open-Source Software: Open-source software developed for commercial purposes must adhere to cybersecurity best practices under the CRA. However, it is not required to have a CE marking. 

  • Cybersecurity Standards for Open-Source in Commercial Products: Manufacturers incorporating open-source software into their products must ensure these components meet cybersecurity standards, including regular updates and vulnerability management. 

Strengthening Cybersecurity for Critical Infrastructure 

The Cyber Resilience Act plays a crucial role in protecting Europe’s critical infrastructure. Digital products used by these services must meet established cybersecurity standards to avoid potential disruption from cyberattacks.  

  • Security of Critical Infrastructure: The CRA ensures that products integrated into critical infrastructure, such as power grids and transportation systems, are secure by default. 

  • Complementing Existing Regulations: The CRA complements existing regulations like the EU Cybersecurity Strategy and the NIS2 Directive, creating a unified framework for resilience across various sectors. 

  • Sector-Specific Requirements: Some sectors have additional or specific requirements, with existing EU rules on medical devices and vehicles remaining unaffected by the CRA. 

  • Consistency in Radio Equipment Regulations: The cybersecurity of radio equipment will continue to be governed by pre-existing regulations, ensuring consistency within the EU’s legislative framework. 

  • Focus on Security Updates and Vulnerability Management: Manufacturers must provide security updates for their products throughout their lifespan, addressing vulnerabilities as they arise. 

  • Support Periods for Products: The CRA mandates at least five years of security updates for most products, with longer support periods required for products with longer lifespans, such as industrial systems or hardware. 

  • Vulnerability Reporting and Fixes: If a vulnerability is discovered, manufacturers must promptly inform users and fix the issue. 

  • Incident Reporting Requirements: If a product’s security is compromised, manufacturers must notify relevant authorities and affected users, including mandatory reporting to cybersecurity agencies like ENISA. 

Ensuring Transparency and Market Compliance 

Transparency is a critical element of the Cyber Resilience Act. The Act mandates that products with digital components must be assessed for conformity, with a special focus on those deemed to be higher risk.  

  • Lifecycle Cybersecurity Assessments: Assessments will verify that products meet cybersecurity requirements throughout their lifecycle, ensuring manufacturers handle vulnerabilities responsibly and products are secure by default. 

  • Market Surveillance and Compliance: The CRA provides a framework for market surveillance authorities to ensure that products meet cybersecurity standards. If a product poses significant cybersecurity risks or fails to comply with regulations, authorities can enforce corrective actions, including recalls or withdrawals. 

  • CE Marking as Compliance Indicator: The CE marking will serve as the primary indicator of a product’s compliance with cybersecurity standards, helping consumers make informed purchasing decisions. 

  • Harmonized Standards for Compliance: The CRA encourages the development of harmonized standards to simplify the conformity assessment process. Products meeting these standards will be presumed compliant, streamlining market entry and ensuring consistent security levels across the EU. 

  • Cybersecurity Certifications: The EU Cybersecurity Certification Scheme (EUCC) will be an essential tool for manufacturers to demonstrate compliance with cybersecurity requirements for products sold within the EU. 

  • Role of the European Commission: The Commission will adopt these cybersecurity standards and provide additional technical specifications as needed to support compliance. 

Cybersecurity and the Digital Single Market 

The CRA plays a pivotal role in the EU’s Digital Single Market, which aims to ensure the free flow of digital products and services while maintaining high standards of safety and security. By introducing the CE marking for compliant products, the CRA provides a unified approach that prevents the fragmentation of the digital market. Consumers will have confidence that the digital products they purchase are secure, reducing risks associated with cyberattacks and ensuring the integrity of Europe’s digital economy. 

In this context, market surveillance authorities will work together to monitor compliance across Member States, while entities like ENISA and CSIRTs (Computer Security Incident Response Teams) will ensure that cybersecurity incidents and vulnerabilities are effectively reported and managed. 

As the Cyber Resilience Act transitions into full effect by December 2027, Member States will provide support for small businesses and microenterprises to help them comply with the new cybersecurity requirements. This support could include regulatory sandboxes, training programs, and guidance to reduce the burden of compliance for smaller players in the market.  

Additionally, financial aid may be made available to help reduce the costs of third-party conformity assessments, making it easier for smaller manufacturers to meet the high standards of the CRA. 

Penalties for Non-Compliance 

The Cyber Resilience Act (CRA) enforces penalties for non-compliance, emphasizing the importance of adhering to cybersecurity requirements within the European Union.  

  • Penalties for Non-Compliance: Companies failing to meet the CRA’s obligations may face significant fines. Serious violations could result in fines of up to €15 million or 2.5% of the company’s worldwide annual turnover from the previous financial year, whichever is higher. For other breaches, fines could reach €10 million or 2% of annual turnover. 

  • Fines for Misleading Information: Providing incorrect, incomplete, or misleading information to market surveillance authorities or notified bodies may incur fines of up to €5 million or 1% of the company’s worldwide turnover. 

  • Penalty Structure: The penalties are designed to be effective, proportionate, and dissuasive, ensuring strong deterrents against non-compliance. Market surveillance authorities are responsible for enforcing these penalties and can take actions such as requiring corrective measures, restricting non-compliant products, or removing them from the market. 

  • Role of Member States: Each Member State must establish rules for penalties and enforce them effectively, sharing information with other EU countries as necessary. 

  • Factors in Determining Fines: Authorities will consider factors like the nature and severity of the infringement, its consequences, and the company’s size and market share when determining fines. 

  • Combination of Fines and Corrective Actions: Administrative fines may be combined with other corrective measures to ensure that companies comply with cybersecurity standards and protect the digital ecosystem. 

How Cyble, the award winning Cybersecurity firm, help you achieve compliance?

The Cyber Resilience Act (CRA) marks an important milestone in enhancing cybersecurity across Europe, solidifying the EU’s position as a prominent player in the global effort to secure cyberspace. With mandatory requirements for digital products, a focus on transparency in vulnerability management, and a framework for market surveillance, the CRA ensures the safety and security of Europe’s interconnected digital ecosystem. 

To better understand the complexities of compliance and upgrade your cybersecurity efforts, Cyble, a leading provider of threat intelligence solutions, offers powerful tools to help organizations be compliance-ready. Cyble’s flagship platform, Cyble Vision, utilizes AI, machine learning, and human intelligence to monitor and manage digital risks effectively. With features like continuous deep and dark web monitoring, attack surface management, and real-time alerts, Cyble empowers businesses to identify vulnerabilities, mitigate threats, and maintain compliance with the CRA’s stringent requirements. 

By integrating Cyble’s solutions, organizations can ensure secure products, manage vulnerabilities, and provide timely updates, helping them meet the rigorous cybersecurity standards set by the CRA. Cyble’s proactive threat intelligence capabilities and real-time insights enable businesses to protect their digital assets, comply with regulatory obligations, reduce cyberattack risks, and enhance overall resilience in the digital environment. 

The post Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  appeared first on Cyble.

Blog – Cyble – ​Read More

Fortinet Patches Critical FortiWLM Vulnerability

Fortinet has released patches for a critical-severity path traversal vulnerability in FortiWLM that was reported last year.

The post Fortinet Patches Critical FortiWLM Vulnerability appeared first on SecurityWeek.

SecurityWeek – ​Read More

Top 10 Industries Targeted by Threat Actors in 2024 

Cyble | Threat Actors

As cyber threats continue to evolve, threat actors are refining their techniques and focusing on industries that hold valuable information or play critical roles in society. From ransomware attacks paralyzing operations to data breaches compromising millions of individuals, no sector is immune to cyberattacks. Drawing from recent reports and insights, this blog explores the top 10 industries targeted by cybercriminals in 2024 and the measures they can adopt to bolster their defenses. 

1.Government and Public Sector: Custodians of National Security 

Government agencies and public sector entities face constant threats, often from nation-state actors seeking strategic advantages or hacktivists with ideological motivations. The sheer volume of citizen data and critical infrastructure managed by these organizations makes them prime targets. 

Major Threats: 

  • Espionage: Stealing sensitive data for strategic or financial advantage. 

  • DDoS Attacks: Overwhelming systems to disrupt public services. 

Mitigation Strategies: 

Government entities need to prioritize inter-agency collaboration and establish centralized cybersecurity frameworks. Investments in AI-based threat intelligence platforms and public-private partnerships can also bolster resilience against sophisticated attacks. 

2. Energy and Utilities: The Backbone of Critical Infrastructure 

The energy and utilities sector plays a pivotal role in national economies and security. This makes it a frequent target for both cybercriminals and nation-state actors, with attacks often aiming to disrupt critical infrastructure. 

Major Threats: 

  • ICS Attacks: Compromise of control systems can lead to widespread outages. 

  • Supply Chain Attacks: Threat actors exploit vulnerabilities in third-party vendors to infiltrate systems. 

Mitigation Strategies: 

To protect against these threats, the sector must prioritize ICS cybersecurity by segmenting operational networks from IT networks. Enhanced supply chain scrutiny, robust third-party risk management to monitor vendor vulnerabilities, and partnerships with government cybersecurity agencies can further strengthen defenses against advanced threats. 

3. Healthcare: Where Lives and Data Intersect 

The healthcare industry is one of the fastest-growing targets for cybercriminals, with a staggering 180% increase in ransomware and database leak incidents compared to 2023. Patient safety, critical care, and sensitive medical data make this sector highly lucrative for attackers. 

Major Threats: 

  • Ransomware: Delays in accessing medical records can have life-threatening consequences. 

  • Database Leaks: Leaked patient records often lead to identity theft and insurance fraud. 

Mitigation Strategies: 

Healthcare organizations must adopt a layered security approach, including data encryption, multi-factor authentication, and comprehensive employee training programs to detect phishing attempts. Regular cybersecurity drills and incident response planning are also essential. 

4. Manufacturing: The Cornerstone of Global Supply Chains 

The manufacturing sector leads the list, experiencing an alarming 377 confirmed attacks in the first half of 2024 alone. Manufacturing remains vital to the global economy, and its reliance on interconnected systems, including Industrial Control Systems (ICS), exposes it to significant risks. 

Major Threats: 

  • Ransomware: By locking critical systems and demanding high ransoms, ransomware attacks in manufacturing can lead to halted production lines, financial losses, and delayed supply chains

  • Database Leaks: Intellectual property, design data, and supply chain information have been prime targets for data exfiltration. 

Mitigation Strategies: 

To mitigate these threats, manufacturers should prioritize securing Industrial Control Systems (ICS) by isolating critical systems, conducting regular vulnerability assessments, and adopting robust endpoint protection solutions. Additionally, incorporating advanced network monitoring tools like Cyble Vision can help detect anomalies before they escalate into breaches. 

5. Financial Services: A Prime Target for Monetary Gain 

The financial services sector consistently ranks among the most targeted industries due to its access to funds and sensitive customer data. In 2024, cybercriminals have adopted sophisticated tactics, leveraging advanced persistent threats (APTs) and exploiting insider vulnerabilities. 

Major Threats: 

  • Ransomware: Demands for multimillion-dollar payments are becoming routine. 

  • Cryptocurrency Exploits: Attackers target blockchain systems and exchanges to siphon off digital assets. 

  • Phishing and Social Engineering: Deceptive tactics to gain unauthorized access to accounts. 

Mitigation Strategies: 

To combat these threats, financial institutions must deploy state-of-the-art AI-driven Threat Intelligence tools. These tools can identify anomalous patterns indicative of fraud or cyberattacks. Additionally, implementing strict access controls and conducting regular security audits are crucial for minimizing risk. 

6. Professional Services: Custodians of Confidential Data 

Professional service firms, including law, accounting, and consulting firms, have witnessed a 15% uptick in cyberattacks compared to 2023. These organizations store highly sensitive client data, making them attractive to threat actors

Major Threats: 

  • Ransomware: Disruption in service delivery can damage client relationships. 

  • Database Leaks: Exposed data can lead to legal liabilities and reputational damage. 

Mitigation Strategies: 

Firms should enforce strict data access controls and encrypt all client information. Regular penetration testing and vulnerability scans can help identify weaknesses before attackers exploit them. Moreover, adopting secure communication platforms can safeguard sensitive exchanges. 

7. Technology: Guardians of Innovation 

Technology companies, encompassing software developers, IT services, and hardware manufacturers, remain high-value targets. Although a slight decline in attacks was noted in 2024, this sector is still vulnerable due to the sensitivity of its intellectual property. 

Major Threats: 

  • Data Breaches: Proprietary technology, source codes, and user data are often exfiltrated. 

  • Ransomware: Cybercriminals lock critical software systems, halting innovation pipelines. 

Mitigation Strategies: 

Incorporating advanced AI-driven cybersecurity solutions can detect and neutralize threats in real-time. Technology firms should also implement bug bounty programs to uncover vulnerabilities before malicious actors exploit them. 

8. Retail and E-commerce: A Treasure Trove of Consumer Data 

Retailers and e-commerce platforms process massive volumes of personal and payment information, making them a lucrative target for threat actors. In 2024, both online and physical operations have faced increased attacks. 

Major Threats: 

  • POS Malware: Point-of-sale systems are compromised to steal cardholder data. 

  • Credential Stuffing: Attackers exploit reused passwords to breach user accounts. 

Mitigation Strategies: 

Retail businesses must adopt end-to-end encryption for payment data, deploy multi-factor authentication for account access, and regularly monitor systems for unusual activity. Cybersecurity awareness campaigns targeting both employees and customers can further reduce risks. 

9. Education: Hubs of Knowledge and Innovation 

Educational institutions, particularly universities, are increasingly targeted for their intellectual property, personal data, and operational vulnerabilities. Attackers often aim to disrupt operations or monetize stolen data on the dark web

Major Threats: 

  • Dark Web Exploitation: Selling stolen academic research and personal data. 

  • DDoS Attacks: Crippling online learning platforms and administrative systems. 

Mitigation Strategies: 

Educational institutions must implement robust cybersecurity frameworks, including identity management systems and regular security awareness training. Strong network segmentation and frequent system updates can also help reduce exposure to cyber threats

10. Small Businesses: The Underdogs in Cybersecurity 

Small and medium-sized businesses (SMBs) are often perceived as easy targets due to their limited cybersecurity budgets and expertise. Despite their size, the impact of a breach on SMBs can be devastating. 

Major Threats: 

  • Phishing: Cybercriminals manipulate employees to gain access to sensitive data. 

  • Ransomware: Locking systems and demanding ransoms can cripple operations. 

Mitigation Strategies: 

SMBs should focus on implementing basic yet effective cybersecurity measures, such as routine software updates, secure data backup solutions, and employee training programs to recognize phishing attempts. Outsourcing cybersecurity to managed service providers (MSPs) can also offer cost-effective protection. 

Emerging Trends in Cybersecurity Attacks Across Industries 

While the above industries remain top targets, certain emerging trends in cyberattacks warrant attention across sectors: 

  • Supply Chain Vulnerabilities: Attackers increasingly target third-party vendors to infiltrate larger organizations. 

  • AI-Driven Threats: Threat actors are using AI to automate attacks and evade traditional security measures. 

  • Deepfake and Impersonation Scams: These new-age tactics are used to manipulate trust and extract sensitive information. 

Key Takeaways for 2024 

  1. Ransomware Dominates: Nearly every industry has faced ransomware attacks, underscoring the need for robust backup and recovery strategies. 

  1. Employee Awareness is Crucial: Phishing and social engineering remain the primary methods of attack. Training employees to recognize these threats can significantly reduce risks. 

  1. AI-Powered Defense is Essential: As attackers become more sophisticated, industries must leverage AI and machine learning to stay ahead. 

Conclusion 

The evolving cyber threat landscape in 2024 underscores the importance of vigilance, innovation, and collaboration in cybersecurity. Whether it is the manufacturing sector grappling with ICS vulnerabilities or small businesses struggling with limited resources, all industries must adopt a proactive stance. By prioritizing security investments, fostering a culture of awareness, and leveraging cutting-edge technologies, organizations can safeguard their operations, customers, and reputations in an increasingly connected world. 

The road ahead demands resilience, adaptability, and a unified effort against cyber adversaries. Let 2025 be a year of strengthened defenses and collective action to combat the relentless tide of cyber threats. 

The post Top 10 Industries Targeted by Threat Actors in 2024  appeared first on Cyble.

Blog – Cyble – ​Read More

Juniper Warns of Mirai Botnet Targeting Session Smart Routers

Juniper Networks says a Mirai botnet is ensnaring session smart router devices that are using default passwords.

The post Juniper Warns of Mirai Botnet Targeting Session Smart Routers appeared first on SecurityWeek.

SecurityWeek – ​Read More

This VPN Lets Anyone Use Your Internet Connection. What Could Go Wrong?

A free VPN app called Big Mama is selling access to people’s home internet networks. Kids are using it to cheat in a VR game while researchers warn of bigger security risks.

Security Latest – ​Read More

The best privacy services as a gift | Kaspersky official blog

With just a few days left before Christmas, overwhelmed shipping services might fail to deliver your gifts on time. Of course, you could always get a last-minute digital gift-card or subscription — but the fact is that everyone who might be interested in a Netflix or Spotify account probably already has one. And Telegram Premium? That’s a little awkward just now.

But there is a solution! Why not give the gift of an increased level of daily security this festive season? (A dull idea? Beats socks, surely?!) Many people know they should protect their data and online activity, but don’t have the time or energy to do so. A service that ensures their privacy is therefore not only an unusual gift, but a genuinely helpful one too.

Privacy services are generally paid for — with a few rare exceptions. After all, maintaining servers to store data and developing hack-resistant software comes with a cost. Without subscription fees, these services would have to sell user data to advertisers — just like Google and Meta do — which would defeat the point. So a year-long subscription to a privacy-enhancing service has financial value as well.

With our recommended services, your giftee can replace unsafe office applications, note-taking services, and messengers with privacy-focused alternatives that don’t misuse stored information.

But before making a purchase, keep in mind two key points:

First, services designed for communication or collaboration, such as encrypted messengers, are useless to gift to a single person. Who will you message if none of your friends use the app? It’s probably better to gift such a service to an entire group.

Second, privacy tools may offer less convenience and functionality compared to popular alternatives that prioritize less on security. Whether this compromise proves critical will depend on the recipient’s needs and habits.

With these provisos duly noted, let’s explore some high-quality privacy-oriented alternatives to popular services that would make great gifts this Christmas or New Year.

Office applications

Personal diaries, research-paper drafts, and financial calculations are becoming harder to protect from prying eyes. Services like Google Docs have always been completely online — sparking both concerns about leaks, and debates over how Google processes stored data. Microsoft has been trying to catch up in recent years, including with a host of questionable features even in its offline Office suite such as auto-saving to OneDrive, optional “connected experiences”, and LinkedIn integrations. Storing data in the cloud isn’t necessarily problematic in itself, but there are concerns that documents can be used for ad targeting, AI training, or other unrelated purposes.

Is it possible to combine collaborative document editing and cloud storage without these concerns? As it turns out, yes. A less feature-rich, yet convenient and private alternative to Google Docs and Office365 is the CryptPad service. You can work together on documents, slides, spreadsheets, and whiteboards, while storing all data on servers with end-to-end encryption.

If you want (and have the needed tech-wherewithal), you can set up a CryptPad server independently. However, there’s no need for ordinary users to do so. The developers themselves maintain the cryptpad.fr server, offering paid plans for increased storage and other benefits. Plans are available for €5, €10, and €15 per month, with discounts for annual payments. You can explore other public CryptPad servers here.

VPN

Although we’ve written repeatedly about the benefits of using a VPN, let’s remember once again that a VPN is not a standalone privacy tool. However, when used correctly alongside other tools, a VPN can indeed help enhance privacy. For example, it can protect against surveillance by your internet provider or Wi-Fi hotspot owner, and secures your data from hackers sitting at the next table in a cafe. There are thousands of VPN services to choose from, with people using them for a variety of practical ends. But free VPNs always come with a question: how do they remain free? After all, maintaining a VPN service has its costs. Alas, the adage “if you’re not paying for the product, you are the product” applies here too.

That’s why we recommend using a trusted, paid VPN instead of just some random one from the internet. Choose a paid-only service from a company with proven expertise in cybersecurity. For example, a fast and unlimited VPN like can be purchased either can be purchased either independently, or as part of the Kaspersky Plus or Kaspersky Premium subscriptions.

Messengers

While popular messengers like WhatsApp and Signal already provide end-to-end encryption, there’s still room for improvement when it comes to privacy. Both apps require a phone number for registration, and WhatsApp, as part of the Meta empire, collects metadata about users’ social connections.

The Threema messenger is free of these issues. Threema allows registration with a random ID and doesn’t require a phone number. It also enables users to manage the trust level of their contacts. For example, you can verify encryption keys by physically being near your conversation partner. While similar verification features exist in Signal and WhatsApp, they’re buried deep in menus. Threema, on the other hand, shows the trust level right next to the contact’s name.

The app is paid, but affordable — €6 for lifetime usage.

Note-taking apps

There are tons of note apps out there — and every smartphone comes with its own — but data synchronization between devices often lacks robust encryption. We compared several private note apps in a separate article, so here we’ll just remind you that one of the best options for securely storing notes is Obsidian, a very powerful app with rich functionality. Obsidian itself is free, but its encrypted note synchronization service, Obsidian Sync, costs around $48 per year.

Browsers and email

You’ll be hard pressed to find a gift subscription to a private browser or email service, as browsers are generally free — even private ones. Meanwhile, the privacy of a specific email service doesn’t mean much when emails are still sent via standardized, open communication channels to recipients who don’t use private services.

However, your everyday online activities can be made significantly more private by using Kaspersky Premium. This is the most advanced version of our comprehensive home user protection, with maximum privacy protection functionality. Thanks to Private Browsing and Webcam and Mic Control, Kaspersky Premium minimizes your digital footprint on the internet, and prevents more dangerous threats like spyware and phishing. The Safe Money feature protects your finances when shopping/paying online, while Identity Theft Check notifies you of any data leaks and advises on how to address them.

On mobile devices, Kaspersky Premium not only prevents harm from phishing and malware, but also protects against surveillance from AirTags or stalkerware. And of course, Kaspersky Premium includes the Kaspersky Password Manager, the unlimited high-speed Kaspersky VPN Secure Connection, and even a year of Kaspersky Safe Kids protection.

Any of these gifts is a perfect way to share your care — ensuring the privacy and security of your loved ones in the year ahead.

Kaspersky official blog – ​Read More