Elon Musk Destroys Smartphones For Security Reasons
Elon Musk destroys all his old smartphones: he does not hold onto a single smartphone but replaces it all the time.
RobbinHood: the ransomware that exploits its own reputation
The attackers behind the RobbinHood ransomware seem to be using the notoriety of their strand of ransomware for their own gain.
48% of corporate data is now stored on the cloud
A new study highlights a disparity between the rapid growth in the amount of data stored in the cloud and the security approach of many organizations.
Instagram flaw exposes private information
Facebook has confirmed a potential security flaw that allows private Instagram posts to be shared publicly. How to protect your devices?
Prying-Eye: the vulnerability that opens the door to industrial espionage
In July, cybersecurity researchers discovered a vulnerability, which they have called Prying-Eye, in the video conference platforms Cisco Webex and Zoom.
How to respond to cybercriminals?
Most of the cyber criminals are money-driven, so their main goal is to put their hands on your hard-earned money somehow. How to respond to them?
The Complete Guide to Facial Recognition Technology
This complete guide on facial recognition technology teaches you what it is, where it’s being used, how it can be dangerous and ways you can opt out.