Everything you need to know about cryptojacking
Cryptomining is a tactic that is becoming more and more popular among cybercriminals. Find out more about the emerging trend of cryptojacking, and what its consequences are.
52% of users reuse their passwords
Researchers have carried out a study on password reuse and modification patterns. They have uncovered an alarming figure: 52% of the users studied have the same passwords for different services.
Two-Factor Authentication Isn’t Foolproof
Two-factor authentication is a great breakthrough for security, but by no means does it mean that our job here is done and we can now put our feet up.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.
How Much Does Social Media Know About You
Assure that you and your data are safe on social media like Facebook and Twitter by using this guide.
Amazon Echo – the security risk you invite into your home?
An Amazon Echo user reported their private conversation had been recorded and emailed to a contact – without their permission