1644 posts
Is there for a future for traditional text passwords?
“It doesn’t matter how complex or unique they are, your passwords can no longer protect you” (Matt Honan, Wired) It is relatively easy to find…
The invisible trail left by your device’s battery which leads right to you
While smartphones and tablets continue to have more features which help make our lives easier, their battery life isn’t usually something which users are happy…
Google will block extensions that try to deceptively install themselves on your browser
Surely this has happened to you before: you’re browsing online and you come across a blog or website that has a plugin for Chrome that…
Virus in the name of WhatsApp! Now via email!
WhatsApp – VocĂŞ recebeu uma menssagem de voz… Have you also received this notification and understood it to mean that you have a voice message in…
Ashley Madison. Should your company invest in cyber insurance?
What started out as a dating site – albeit a controversial one at that – has turned into a nightmare. Ashley Madison, a dating site…
The most sought-after professional profiles in the information security sector
Direct attacks, identity and information theft of all sorts (especially social engineering), persistent advanced threats… the risks associated with information security are continually multiplying in…
Six challenges for the Chief Information Security Officer
The increasingly complex landscape that society’s mass digitization has established, driven by mobility and permanent connectivity, coupled with the new risks and threats that are…