Managing passwords and privileged access is bad enough for people—but that’s going to be dwarfed by the problem of dealing with non-human identities.
Authentication
How Hackers Hijacked Thousands of YouTube Accounts


Google has shed light on a spate of attacks that turned creator channels into cryptocurrency scam livestreams.
The 12 Best Features in Android 12—and How to Install It

The latest version of Google’s mobile operating system has some handy new improvements, and Pixel owners can download it now.
How to Switch From Google Authenticator to Another 2FA App
Yes, you can choose another two-factor authentication app without getting locked out of your accounts.
A Telegram Bot Told Iranian Hackers When They Got a Hit


APT35 may not be the most dangerous group out there, but they’ve got a new phishing trick.
How to secure Microsoft 365 with app governance

How can you protect your network and data from consent phishing attacks? Microsoft’s new app compliance program can help.
iCloud vs. OneDrive: Which is best for Mac, iPad and iPhone users?

Cloud file storage has become a necessity for almost every business user. Two heavyweights lead the fight, but one boasts an edge in convenience when using Apple hardware.
Short Battery Life Sinks the Otherwise Great Surface Pro 8

This 2-in-1 from Microsoft is a powerful workhorse for all your office tasks—if you sit near an outlet.
Windows 10: A cheat sheet

This comprehensive guide covers must-know Windows 10 details including features, system requirements, upgrade options and Microsoft’s Windows-as-a-service strategy.
Help Might Finally Be on the Way to Fight SIM-Swap Attacks


Plus: A cybersecurity CEO arrest, an Apple Pay hack, and more of the week’s top security news.