Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…More information
- Zoom is becoming what Apple’s FaceTime should have been
- Profits, falling crimeware prices driving Chinese cybercrime
- Gozi Banking Trojan Targets Windows 10’s Edge Browser
- Banks pulls out of class-action suit against Target, Trustwave
- FBI suspends case against Apple after feds find way to break into seized iPhone
- To counter AI cheating, companies bring back in-person job interviews
- US Government Releases Guidance on Securing Election Infrastructure
- Production AIS Service Degradation – October 28
- Survey: About half of organizations use cloud-based services for sensitive data
- Three Signs Your Teen May Be Sexting and What to Do About It