Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…More information
- Mitel/ I2 Session Border Controller Maintenance Work
- Iranian Cyberspies Use New Trojan in Middle East Attacks
- Israel cellphone provider Pelephone says technical malfunction, not hackers, disrupted service
- Experimental malware uses inaudible sound to defeat network air gaps
- US 2012 Elections Apps May Lead to Data Disclosure
- What’s wrong with marketing software?
- Researchers dismantle decade-long Iranian cyberespionage operation
- How to Check if Someone is Using Your Identity
- Critical Vulnerability in Elementor Plugin Impacts Millions of WordPress Sites
- Hackers Steal Customer Card Data From GameStop