Two-Factor Authentication Isn’t Foolproof
Two-factor authentication is a great breakthrough for security, but by no means does it mean that our job here is done and we can now put our feet up.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.
How Much Does Social Media Know About You
Assure that you and your data are safe on social media like Facebook and Twitter by using this guide.
Amazon Echo – the security risk you invite into your home?
An Amazon Echo user reported their private conversation had been recorded and emailed to a contact – without their permission
Online Genealogy Platform MyHeritage Has Been Hacked
A cyber leak involving the details of tens of millions of people was reported earlier this week. The sensitive data has been stolen from the…
Emergency Room Patients Targeted by Personal Injury Law Firms
Injury attorneys have found a way to deploy geofencing and geotracking marketing campaigns aimed at patients visiting hospitals, pain clinics, and chiropractor offices.