Despite all the inroads AMD has made in recent years with its Zen desktop CPUs, Intel has broadly managed to maintain one critical edge against its longtime rival: gaming performance. For those looking to eke every possible frame out of the latest AAA games, the company’s recent Core 5/7/9 often outperformed their AMD counterparts. Historically, however, that performance has come at the cost of power efficiency and thermals. Intel’s best 13th-genereation processors are absolute power-hungry beasts. That has limited their appeal, especially as small-factor PC builds have become more popular.
On Thursday, Intel detailed it’s long-awaited Arrow Lake processors, announcing five new models arriving on October 24. With the new CPUs, Intel is promising a paradigm change. Compared to its previous generation Raptor Lake chips, the company said its goal was to reduce power consumption by 40% and internal package temperatures by as much as 10 degrees Celsius. Judging by the benchmarks Intel shared ahead of today’s announcement, the company did just that.
Intel’s new flagship, the Ultra 9 285K, features a 24-core CPU design consisting of eight ‘Lion Cove’ performance cores and 16 ‘Skymont’ efficiency cores, and a maximum boost clock of 5.7GHz. It, alongside the rest of the current Arrow Lake family, also comes with a neural processing unit (NPU), a first for one of Intel’s desktop CPU. But those specs aren’t what’s interesting about the 285K and its siblings.
In “lightly-threaded” workloads, including tasks such as Zoom calls and select Cinebench benchmarks, Intel recorded the 285K drawing up to 58% less power than the 14900K, the company’s 14th generation flagship. When it comes to gaming performance, the results are even more interesting. In Warhammer 40,000: Space Marine 2, for instance, Intel said it saw the 285K run the game on average 4% faster, while drawing 165W less of system power. Even in more GPU-intensive games such as Black Myth: Wukong, the 285K offers promising efficiency gains, with Intel noting it saw the CPU draw 34 fewer watts of total system power compared to the 14900K.
Advertisement
Those efficiency improvements translate to equally impressive thermal gains, with Intel noting its data shows the 285K runs, on average, about 13 degrees Celsius cooler than the 14900K during gaming loads. The new processor even offers similar gaming performance when users limit its power draw from Intel’s default of 250W to 175W or 125W. For those who like to undervolt their CPU or plan to go with an ITX case and motherboard for their next build, that’s exciting news.
“I think it’s safe to say this is a huge turn of the corner for our desktop portfolio,” said Robert Halleck, general manager of Intel’s AI and Technical Marketing units. “I’m confident your testing will match the numbers we’re talking about today.”
On paper, Arrow Lake is exactly what Intel needs to claw its way back to sustainability; it’s easily the most efficient family of desktop processors the company has put out in a long time. However, whether that alone will be enough to turn Intel’s fortunes around is less clear.
In the short term, the company faces a rival AMD that is more competitive than ever. In the long term, it’s difficult to say how much of Arrow Lake’s efficiency should be solely attributed to Intel’s engineers. As recently as 2022, the company had maintained it would build the new processors using a combination of its own 20A fabrication process and TSMC’s 3-nanometer technology. But then Intel recorded a $1.6 billion loss in Q2 of this year and said it would cut more than 15,000 jobs in an effort to reduce costs by $10 billion. Part of that plan involved fully outsourcing Arrow Lake manufacturing to a third party. At the time, Intel didn’t specifically name TSMC. However, the list of companies capable of producing silicon at the density and scale required for Arrow Lake is very short. With Intel reportedly hitting a recent snag to get its next-generation 18A process off the ground, it’s clear the company still has a long ahead.
Advertisement
When the Intel Core Ultra 9 285K arrives on October 24, it will cost $589. For those looking for a more affordable entry into Intel’s Arrow Lake ecosystem, the company will also offer the 14-core Ultra 5 245KF for $294 and the 20-core Ultra 7 265K for $394. Alongside its KF sibling, which comes without an integrated Intel Xe GPU, the 265K looks like it will be the dark horse of Intel’s Arrow Lake line. The company said that 265K runs about 15 degrees cooler than the 14900K and draws up to 188W less system power.
Alongside its new Arrow Lake processors, Intel also shared more information about its upcoming Arrow Lake H laptop chips, which the company said would arrive at the start of next year.
The Xiaomi 15 Pro has been spotted out in the wild
If you check out the gallery below, you’ll see the device in the hand of the Xiaomi Group Vice President, Wang Xiaoyan. This phone may resembles the Xiaomi 14 Pro, but it’s not the same. You’ll notice that the LED flash sits outside the camera island.
The design overall does seem to be quite similar to what the Xiaomi 14 series brought to the table. The camera island does look very similar, and it’s placed in the same spot as on the Xiaomi 14 Pro.
The phone will have mostly flat sides, it seems, though there will be some curves on the edges. That camera island on the back will protrude, that much is obvious. You can also see the volume up and down buttons on the right-hand side of the phone.
Advertisement
This image also reveals that the phone will be made out of metal and glass, as expected. It actually goes hand-in-hand with the renders that have surfaced not long ago.
Qualcomm’s brand new flagship SoC will fuel this smartphone
The phone is expected to include the all-new Snapdragon 8 Elite aka Snapdragon 8 Gen 4 processor. That chip is expected to arrive later this month. Along with that, it will offer at least up to 16GB of LPDDR5X RAM and UFS 4.0 flash storage.
The device could include a 6.78-inch quad micro-curved AMOLED display, and offer an adaptive refresh rate up to 120Hz. A 6,000mAh battery was also mentioned, along with 90W wired and 80W wireless charging.
A 50-megapixel main camera (1/1.3-inch sensor, f/1.4 aperture) is rumored, along with a 50-megapixel ultrawide camera, and a 50-megapixel periscope telephoto camera (5x optical zoom, macro).
Think about your digital footprint. How many accounts have you created online since you first started using the internet? How many of those use the same passwords, so you have an easier time logging in? It’s a habit we’ve all fallen into, but it greatly weakens our ability to stay secure online. Just one password leak can compromise dozens of accounts.
Password managers can help you break that habit. It’ll do the tedious work of creating and storing various passwords to up your security posture without testing your memorization skills. But there are dozens of password managers available now — that’s why we tested out nine of the best services available now to help you choose the right one for your needs. 1Password remains our top pick for the best password manager, thanks to its zero-knowledge policy, numerous security features and general ease of use, but there are other top password managers out there to consider as well.
Table of contents
Best password managers for 2024
1Password
Advertisement
Number of tiers: 4 | Pricing: $3/month for Individual, $5/month for Families, $20/month for Teams Starter Pack, $8/month per user for Business | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Brave, Edge, Command Line
Many security experts trust 1Password with their private information and, after testing it out, it’s clear why. The service includes industry standard encryption, a “secret key” that only you know on top of your master password, a zero-knowledge policy that means it keeps no data, and other security features like frequent audits, two-factor authentication and a bug bounty program. That said, 1Password did fall victim to a recent cybersecurity incident that’s worth noting. 1Password detected suspicious activity on its Okta instance, but an investigation “concluded that no 1Password user data was accessed.” 1Password now also supports passkeys, which are credentials stored in your most used devices that are protected by biometric authentication (like fingerprints or facial recognition) or PINs.
1Password has a pretty intuitive user interface across its desktop and mobile apps. A tutorial at download helps you import passwords from other managers onto 1Password so that you don’t feel like you’re starting over from scratch. It also clearly rates the strength of each password and has an “open and fill” option in the vault so that you can get into your desired site even more quickly. We also liked the user-friendly option to scan a set up code to easily connect your account to your mobile devices without too much tedious typing.
At $3 per month, the individual subscription comes with unlimited passwords, items and one gigabyte of document storage for your vault. It also lets you share passwords, credit card information and other saved credentials. If you upgrade to the family plan for $5 each month, you’ll get to invite up to five people (plus more for $1 each per month) to be a part of the vault.
Number of tiers: 3 | Pricing: Free, $3/month per user for Teams Organization, $5/month per user for Enterprise Organization | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Brave, Edge, Vivaldi, Opera, Tor, DuckDuckGo for Mac, Command Line
Advertisement
Bitwarden’s free plan includes unlimited passwords on an unlimited number of devices, which is more than we’ve seen from some of its competitors. There are drawbacks like you can only share vault items with one other user, but we think that’s a fair tradeoff.
Bitwarden is based on open-source code, meaning anyone on GitHub can audit it, which is a good measure of security. On a personal level, it includes security audits of your information, like a data breach report, that can keep you in the know about when your passwords have been leaked and when it’s time to change them. Plus, it’s widely available across the platforms we tested, including Windows and iOS, with a level of customization, options to access your password vault and more. It also recently added passkeys to its vault and two-factor authentication options as a secure way to sign in.
Bitwarden may be the best free password manager, but it does have a paid version and we do think it’s worth it. At $10 annually for individuals or $40 for families, you unlock encrypted file storage, emergency access, unlimited sharing and more additional features. But the free version comes with the basics that can get anyone set up on password management easily.
Advertisement
Pros
Robust free version
Based on open-source code
Available across a wide variety of platforms
Cons
Free version can only share a vault with one other user
Number of tiers: 3 | Pricing: Free, $2/per month for Premium, $4/month for Family | Compatibility: macOS, iOS, Windows, Android, Linux, Chrome, Firefox, Safari, Opera, Edge
Across password managers we tested, cross-platform availability was relatively similar. Most are widely available across web browsers and different operating systems, including our other top picks on this list. But we wanted to give a nod to NordPass here because of how easy the service makes it to access your vault from any platform while keeping your data safe. NordPass even lets you use biometric data to sign in now, like your fingerprints or face, making it even easier to get into accounts across devices.
Advertisement
NordPass has a free option with unlimited passwords and syncs across devices. A $2-per-month premium plan keeps you logged in when switching devices, comes with security notifications and allows for item sharing. A family subscription comes with six premium accounts and only costs $4 per month. This makes it an excellent budget option as well. Besides the pairing code to connect accounts, NordPass is a pretty standard password manager. Scanning a code gets me from my laptop to mobile device to work computer super easily. If you’re constantly switching devices and those extra few seconds save your sanity, it’s worth considering.
Number of tiers: 4 | Pricing: Free, $3/month for Advanced, $5/month for Premium, $7/month for Friends and Family | Compatibility: macOS, iOS, Android, Chrome, Firefox, Safari, Brave, Edge, Opera
Dashlane has four subscription options: A free user gets access to a single device with unlimited passwords; an advanced user pays $3 per month to get upgraded to unlimited devices and dark web monitoring; for $5 per month, a premium user also gets VPN access and an $7.49-per-month family plan includes access for up to 10 subscribers.
It met all the criteria we looked for, but with a clear emphasis on sharing credentials. Dashlane highlights “secure sharing” starting at its free level, which is a functionality that some competitors keep behind a paywall. Other free features, however, recently took a hit. Dashlane limited the number of passwords users of the free version could store. Access for up to 10 members in a family plan is one of the bigger plans we’ve seen as well. While we were testing it, password sharing seemed front of mind with a tab dedicated to it in Dashlane’s browser extension. Arguably the biggest caveat here, though, is lack of Linux support.
Advertisement
Pros
Easy to securely share information with others
Free version includes robust sharing features
Cons
Free version supports a limited number of passwords
It seems counterintuitive to store all your sensitive information in one place. One hack could mean you lose it all to an attacker and struggle for months or even years to rebuild your online presence, not to mention you may have to cancel credit cards and other accounts. But most experts in the field agree that password managers are a generally secure and safe way to keep track of your personal data, and the benefits of strong, complex passwords outweigh the possible risks.
The mechanics of keeping those passwords safe differs slightly from provider to provider. Generally, you have a lengthy, complex “master password” that safeguards the rest of your information. In some cases, you might also get a “security key” to enter when you log in to new devices. This is a random string of letters, numbers and symbols that the company will send you at sign up. Only you know this key, and because it’s stored locally on your device or printed out on paper, it’s harder for hackers to find.
These multiple layers of security make it difficult for an attacker to get into your vault even if your password manager provider experiences a breach. But the company should also follow a few security basics. A “zero-knowledge” policy means that the company keeps none of your data on file, so in the event of an attack, there’s nothing for hackers to find. Regular health reports like pentests and security audits are essential for keeping companies up to par on best practices, and other efforts like bug bounty programs or hosting on an open source website encourage constant vigilance for security flaws. Most password managers now also offer some level of encryption falling under the Advanced Encryption Standard (AES). AES 256-bit is the strongest, because there are the most number of possible combinations, but AES 128-bit or 192-bit are still good.
Are password managers worth it?
You likely already use a password manager, even if you wouldn’t think to call it that. Most phones and web browsers include a log of saved credentials on the device, like the “passwords” keychain in the settings of an iPhone. That means you’ve probably seen the benefits of not having to memorize a large number of passwords or even type them out already.
Advertisement
While that’s a great way in, the downfall of these built-in options are that they tend to be device specific. If you rely on an Apple password manager, for example, that works if you’re totally in the Apple ecosystem — but you become limited once you get an Android tablet, Lujo Bauer, professor of electrical and computer engineering, and of computer science, at Carnegie Mellon University, said. If you use different devices for work and personal use and want a secure option for sharing passwords with others, or just don’t want to be tied to one brand forever, a third-party password manager is usually worth it.
How we tested password managers
We tested password managers by downloading the apps for each of the nine contenders on iPhone, Android, Safari, Chrome and Firefox. That helped us better understand what platforms each manager was available on, and see how support differs across operating systems and browsers.
As we got set up with each, we took note of ease of use and how they iterated on the basic features of autofill and password generators. Nearly all password managers have these features, but some place limits on how much you can store while others give more control over creating easy-to-type yet complex passwords. From there, we looked at extra features like data-breach monitoring to understand which managers offered the most for your money.
Finally, we reviewed publicly available information about security specs for each. This includes LastPass, which more experts are shying away from recommending after the recent breach. For the sake of this review, we’ve decided not to recommend LastPass at this time as fallout from the breach still comes to light (The company disclosed a second incident earlier this year where an unauthorized attack accessed the company’s cloud storage, including sensitive data. Since then, hackers have stolen more than $4.4 million in cryptocurrency using private keys and other information stored in LastPass vaults.)
Advertisement
These are the password managers we tested:
Other password managers we tested
LastPass
For a while, security experts considered LastPass a solid choice for a password manager. It’s easy to use, has a slew of helpful extra features and its free version gives you a lot. But we decided not to include LastPass in our top picks because of the high profiledata breaches it has experienced over the past couple of years.
Keeper
Keeper met a lot of the basic criteria we tested for, like autofill options and cross-platform availability. We liked its family plan options, too, that can keep your whole household secure. But we didn’t think its extra features, like the encrypted messaging app, added much value. Plus, it has a self-destruct feature after five incorrect login attempts which, despite adding extra protection, could be a recipe for disaster for casual users.
Enpass
Enpass works well as an affordable password manager. That includes an inflation-beating “lifetime” access pass instead of a monthly payment for users really committed to the service. Still, it was confusing to set up across devices and because Enpass stores data locally, as opposed to in the cloud, we struggled to get started with it on mobile.
Advertisement
Norton
A familiar name in security, we were excited to test out Norton’s password manager. While it’s free, its features seem underdeveloped. It lacked password sharing, account recovery and complex form-filing tools that come standard in many of the other password managers we tested.
LogMeOnce
LogMeOnce comes with a wide range of premium tiers, from professional to family, that include different levels of storage and features. But when we tested, it lacked some basic cross-platform availability that other password managers had already, like compatibility with Mac and Safari.
Password manager FAQs
Why use a password manager?
Using a password manager can enhance your online security. They store all of your complex passwords and autofill them as needed, so that you can have unique, good passwords across the web without remembering each of them yourself. In many cases, unique passwords are your first defense against attack, and a reliable manager makes it easier to keep track of them all.
Are password managers 100 percent safe?
Password managers are a secure way to store your credentials. Experts in the field generally agree that the benefits of accessibility when storing complex passwords outweigh the possibility of attack, like what happened with LastPass. But with any service, it can vary from provider to provider. You should look out for zero-knowledge policies, regular security audits, pentests, bug bounty programs and encryption when choosing the right secure password manager for you.
Advertisement
How do password managers work?
Think of password managers like virtual safe deposit boxes. They hold your valuables, in this case usually online credentials, in a section of the vault only accessible to you by security key or a master password. Most of these services have autofill features that make it convenient to log in to any site without needing to remember every password you have, and they keep your credit card information close for impulse purchases.
But given that passwords are one of the top ways to keep your online identity secure, the real value of password managers is staying safe online. “It’s just not possible without a password manager to have unique, long and hard-to-guess passwords,” Florian Schaub, an associate professor of information and of electrical engineering and computer science at the University of Michigan, said.
Common guidance states that secure passwords should be unique, with the longest number of characters allowed and uppercase letters, lowercase letters, numbers and special characters. This is the exact opposite of using one password everywhere, with minor variations depending on a site’s requirements. Think of how many online accounts and sites you have credentials for — it’s an impossible task to remember it all without somewhere to store passwords safely (especially in instances when you need to create a new password for any given account). Password managers are more readily accessible and offer the benefit of filling in those long passwords for you.
Who are password managers for?
Given their universal benefit, pretty much everyone could use a password manager. They’re not just for the tech-savvy people or businesses anymore because so much sensitive information ends up online behind passwords, from our bank accounts to our Netflix watch history.
Advertisement
That’s the other perk of password managers: safe password sharing. Families, friends or roommates can use them to safely access joint accounts. Texting a password to someone isn’t secure, and you can help your family break the habit by starting to use one yourself, Lisa Plaggemier, executive director at National Cyber Security Alliance, said. Streaming is the obvious use case, but consider the shared bills, file storage and other sites you share access with the people around you as well.
What if I forget my master password?
Forgetting a master password won’t necessarily lock you out for good, but the recovery process varies from provider to provider. Some services give you a “security key” at sign up to enter when you log into new devices. It can also be used to securely recover your account because it’s a random string of keys stored locally that only you have access to. Other services, however, have no way to recover your vault. So creating a master password that you won’t forget is important.
How can I make a good master password?
A good master password should be unique, with the longest number of characters allowed and uppercase letters, lowercase letters, numbers and special characters. Experts often recommended thinking of it like a “passphrase” instead of a “password” to make it easier to remember. For example, you can take a sentence like “My name is Bob Smith” and change it to “Myn@m3isB0b5m!th” to turn it into a secure master password that you won’t forget.
What are passkeys?
A passkey is a sort of digital identification that’s interlocked to your account on a given app or website. While that sounds like a password, there’s an important distinction: Passkeys are bilateral authenticators that have two separate components: a private key stored locally on your device and a public key belonging to the website or application. When logging in with a passkey, these two keys pair and give you access to your account. You can read more about passwords versus passkeys here.
Table Space, an Indian managed workspace provider, is targeting a valuation of $2.5 billion or more for an IPO planned for next year, sources familiar with the matter told TechCrunch.
The Bengaluru-headquartered startup has hired Axis Securities as a bookrunner for the IPO, the sources said.
Founded in 2017, Table Space leases large office spaces, transforms them into fully serviced, tech-enabled campuses, and offers them to corporate clients as customized offices, co-working spaces, and managed meeting rooms. Hillhouse Capital invested $300 million in Table Space in a funding round in late 2022, and the startup is currently valued at about $550 million.
The company operates more than 60 centers across six urban Indian cities, primarily serving Fortune 500 companies such as Apple, Google, Mastercard, PayPal, AMD, Ericsson and Shell. The startup has expanded its real estate portfolio to over 9.5 million square feet across major Indian cities, and aims to nearly double this footprint within three years by investing about $535 million.
Advertisement
Table Space declined to comment.
In a recent interview with an Indian daily, the company’s co-founder and president Kunal Mehra said the company expects annual revenue to reach nearly $600 million by March 2027.
Table Space’s IPO and expansion plans come at a time of mild uncertainty in the global flexible workspace sector. While WeWork’s high-profile struggles have cast doubts on the viability of the co-working space business model around the world, demand for flexible office spaces in major Indian cities remains strong, driven by a growing technology sector and multinational corporations seeking to reduce long-term lease commitments.
Table Space’s plans for the IPO also follow the stellar public debut of Awfis, a Peak XV-backed co-working space provider whose stock has surged nearly 70% in the five months since its IPO. Many startups, including WeWork India, Indiqube and Simpliwork are also in various stages of deliberations to go public.
Advertisement
The Indian market has delivered more tech IPOs this year than the U.S. as valuation multiples approach all-time highs in the South Asian market. Indian firms have raised over $9 billion via IPOs and FPOs this year, even as growth-stage startup deals remain muted.
The Internet Archive is back online in a read-only state after a cyberattack brought down the digital library and Wayback Machine last week. A data breach and DDoS attack kicked the site offline on October 9th, with a user authentication database containing 31 million unique records also stolen in recent weeks.
The Internet Archive is now back online in a “provisional, read-only manner,” according to founder Brewster Kahle. “Safe to resume but might need further maintenance, in which case it will be suspended again.”
While you can access the Wayback Machine to search 916 billion web pages that have been archived over time, you can’t currently capture an existing web page into the archive. Kahle and team have gradually been restoring Archive.org services in recent days, including bringing back the team’s email accounts and its crawlers for National Libraries. Services have been offline so that Internet Archive staff can examine and strengthen them against future attacks.
A pop-up from a purported hacker claimed the archive had suffered a “catastrophic security breach” last week, before Have I Been Pwned confirmed data was stolen. The theft included email addresses, screen names, hashed passwords, and other internal data for 31 million unique email accounts.
Advertisement
The Internet Archive outage came just weeks after Google started adding links to archived websites in the Wayback Machine. Google removed its own cached pages links earlier this year, so having the Wayback Machine linked in Google search results is a useful way to access older versions of websites or archived pages.
A quick start out of the gate is an enormous advantage for sprinters, swimmers, jockeys and race car drivers alike. It’s also extremely valuable to cybercriminals. By exploiting a zero-day vulnerability before anyone else knows about it, cybercriminals gain an early window to infiltrate systems and achieve goals like stealing data or deploying ransomware while avoiding detection.
Attacks that exploit zero-day vulnerabilities cannot be prevented — but they can be faced with confidence. This article offers practical guidance containing these threats by building a resilient IT infrastructure that features reducing the attack surface, fast detection and effective response.
Dirk Schrader
Resident CISO EMEA and VP of Security Research at Netwrix.
The Frustration of Zero-Day Vulnerabilities
It is an inescapable fact that every operating system and software application have vulnerabilities that are not yet known by the vendor or the organizations using the product. Another unhappy fact is that cybercriminals are constantly looking for these vulnerabilities, and when they find one, they begin working hard to find a way to exploit it.
Organizations need to come to terms with the reality that adversaries sometimes succeed in developing an effective zero-day attack and there is little they can do to prevent the initial strike. Instead, they must focus on blocking the escalation of the threat and preventing attackers from gaining access to precious data or establishing control over the whole system.
Essentially, exploitation of a zero-day vulnerability is just the first stage of a longer battle for control over your valuable digital assets. To win that battle, security teams must proactively reduce their exposure to attack, stay on top of vulnerabilities, master threat detection and response, and ensure they can restore operations quickly after an incident.
Advertisement
Reducing the Attack Surface
The first priority in reducing the risk from zero-day vulnerabilities is to minimize the attack surface. Core strategies that will help include disabling unneeded services, implementing a robust patch management process, and segregating your network into distinct segments to isolate critical systems and sensitive data.
Another critical best practice is configuring stringent access controls that adhere to the least privilege principle. Even if an attacker gets into the system, their ability to move laterally will be restricted, since each account has only the access rights necessary for the user to perform their tasks.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
For an even more robust approach, highly privileged accounts can be replaced with just-in-time (JiT) elevated privileges that are granted only after additional verification and that last only as long as needed for the task at hand. Such an approach further limits the ability of an adversary to escalate privileges.
Advertisement
Discovering and Mitigating Vulnerabilities
What makes a vulnerability a zero-day is that it is discovered by adversaries and exploited in attacks before anyone else knows about it. Software vendors usually quickly provide a security patch or mitigation strategy. Unfortunately, many organizations fail to perform the recommended action in good time, so they remain at risk from the vulnerability far longer than necessary.
Accordingly, a robust patch management strategy is another vital element in reducing the attack surface area. That strategy should include scanning systems for unpatched vulnerabilities so they can be mitigated promptly. One option is a traditional patch management tool that scans systems regularly. However, as the number of software products in use has grown, this process now takes more time than ever before. Modern solutions use a discovery process known as a scan-less scan, which maintains a real-time inventory of the software installed on the system and flags any vulnerabilities as they appear.
Detecting Threats in Their Early Stages
Attackers don’t advertise the time and place that they are going to attack, but entire websites are devoted to detailing the tactics and techniques that they use. Identity threat detection and response (ITDR) solutions leverage this knowledge, with a focus on detecting threats relating to identity and access control systems. Signs of these threats include unusual login attempts, suspicious access requests and unplanned changes to privileges. Detection of a threat can trigger automated responses like blocking access and resetting credentials.
Organizations also need an endpoint detection and response (EDR) system. EDR complements ITDR by monitoring endpoints for potentially malicious activity and enabling prompt response to those threats.
Advertisement
Of course, if these solutions flag too many events as suspicious, security teams will be overwhelmed with false alerts. Accordingly, file integrity monitoring (FIM) is also crucial, since it can filter out planned system changes and empower IT teams to focus on swift response to real threats.
Ensuring Quick Recovery
Organizations must also be prepared for attacks that succeed in taking down key systems and destroying or encrypting valuable data. To minimize disruption to the business in the wake of an incident, they need a documented strategy for data recovery and getting processes back on track as soon as possible.
A robust recovery plan starts with backing up key data and systems, testing those backups carefully and storing them securely. If attackers make malicious changes, IT teams should be able to identify the specific assets involved and granularly reverse the modifications. In a broader disaster, IT pros need to be able to quickly restore key domain controllers, applications and data to reduce downtime and business losses.
Conclusion
While it is not possible to prevent cybercriminals from discovering and exploiting zero-day vulnerabilities, organizations can and should take action to reduce the impact of these attacks. By implementing the practices above, organizations can build a multi-layered security strategy that enhances their resilience against not only zero-day exploits, but other types of cyberattacks and insider threats.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
After a few months of use, oils, dust, drink drips, and food crumbs can build up in even the keyboards of our best laptops. No one is immune to this, not even tech experts like us. But there are ways to get your laptop clean again.
We’ve laid out the best ways to clean your laptop keyboard, whether you’re simply trying to disinfect or you need a deep clean. But there are a few critical steps to take before you start scrubbing.
Take a minute and go through the common-sense precautions:
If you have vital data on your laptop, back it up. It’s always a good idea.
Turn your laptop completely off. You may even want to remove the battery, if possible.
Make sure your laptop is unplugged and that there are no accessories attached (including USB dongles).
Make sure you have the space and time. Cleaning your keyboard isn’t something you should do on the go — remember, a desktop keyboard is easy to replace, but if your laptop keyboard gets damaged, that’s a bigger problem.
Everyone knows what this looks like. It may not be as bad as sticky stains, but over time, dust naturally builds up between and on the sides of your keys. If you want to get rid of it, grab a vacuum cleaner.
Wait! We mean grab the right kind of vacuum cleaner. The standard solution is a hand vacuum that comes with small brush attachments that you can slowly maneuver around your keyboard while sucking up the dust. A larger vacuum can work if it also has a dust attachment and isn’t too powerful. After all, you don’t want your vacuum to eat any keys.
In a perfect world, the ideal solution is a micro vacuum attachment, which typically isn’t found outside of labs and specialized workstations. That said, you can always buy your own if you’re very serious about keyboard care.
Compressed air is another possibility, but we don’t recommend it. This double-edged sword will blast much of the dust and crumbs away, but it might also blow much of it further into your laptop, potentially causing more problems. A vacuum cleaner is usually a more efficient solution, so start there.
We’re talking about the crud that builds up as a result of oils, skin cells, grease, food dust, and everything else that might contribute to the gross stains and plaque on your keyboard. You can approach this cleaning mission by using disinfecting wipes, but we prefer using a melamine cleaning sponge, which excels at cleaning up grime such as this.
Once you have the melamine sponge, soak it in water, ring it out, and let it dry enough so that you aren’t leaving streaks of water across your keyboard. Gently rub a corner of the sponge on the soiled parts of the keys until the grime is removed. Melamine can be a very abrasive material if used carelessly, so go slow and try to avoid rubbing off any key characters. The material is also very easy to cut out into the right shape, so feel free to snip off a portion for more customized work.
You can use another type of sponge in the same way, but it may not be as effective, especially when it comes to the more stubborn stains.
It’s normal to worry about germs on your keyboard, especially if you’ve been working in an office or a classroom full of sick people. If your keys are a little too dirty and you’re wondering if they may have become a biohazard, then it’s time to get out the disinfectant.
Advertisement
Specifically, get some isopropyl alcohol and a bundle of cotton swabs. Isopropyl is essential, because stronger versions thereof may accidentally burn off some of your keyboard letters. Cotton swabs or Q-Tips, on the other hand, are crucial because you don’t want any liquids near your keyboard, even when cleaning. Dip and dab a swab so that it’s damp but in no danger of dripping, and then start wiping your keys one by one. This somewhat tedious method is very effective but easier to do if, well, you’re a little bored and have some time to waste.
Spilling something potentially sticky across the top of your laptop keyboard is often cause for alarm. To reduce the odds of permanent damage, prioritize protecting your laptop’s internal components. Shut everything down, take out your battery, and unplug the computer if necessary. Don’t turn it back on again until you are confident that any liquid inside has evaporated. Depending on the type of spill (and how severe it is), it may take a day or two to dry out. If it looks like your operating system or data sustained damage, take your laptop in for repairs ASAP.
In the meantime, it’s time to clean your keys. For the surface of your laptop’s keyboard, you’ll want a simple sponge or cloth. Odds are you have to go a bit deeper to clean up more concerning residue that might be trapped beneath, which means you’ll have to remove your keyboard.
Laptop keyboards are all different depending on the manufacturer, the machine’s design, and the age of the computer itself. You can carefully pry off some as a whole unit, others you can ease open key by key. In some cases, you won’t be able to remove the keyboard at all — because the company didn’t manufacture it that way.
You can try to detach each key from the keyboard for optimal cleaning. It’s possible to remove each key with your hands if you’re gentle enough. You can carefully use tools, but make sure they’re not sharp enough to damage the inner workings of your laptop.
Advertisement
You might have trouble removing the keys yourself or be too scared of breaking them in the process or damaging the computer itself. In that case, take it to a professional. Paying a professional will ensure they will clean it without damage.
If you know how to take your keyboard apart for cleaning, you might even be able to save it from a spill if you clean it right after the accident happened. In some cases — especially with exposure to moisture — your computer may be a lost cause. When in doubt, consult a professional for help. Or at least seek confirmation that it’s time to start shopping for a new laptop.
Remember to keep your laptop clean at all times, not just when things start to become unresponsive. As well as cleaning the keyboard, you should be familiar with how to clean your laptop display.
You must be logged in to post a comment Login