Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII)
Take It Personally: Ten Tips for Protecting Your Personally Identifiable Information (PII) Seems like we always have a connected device somewhere within arm’s reach, whether it’s a smartphone, laptop, tablet, a wearable, or some combination of them all. In a way, we bring the internet along with us nearly wherever we go. Yet there’s something […] more…Dox, steal, reveal. Where does your personal data end up?
The technological shift that we have been experiencing for the last few decades is astounding, not least because of its social implications. Every year the online and offline spheres have become more and more connected and are now completely intertwined, leading to online actions having real consequences in the physical realm — both good and […] more…IT threat evolution Q1 2017
Overview Targeted attacks and malware campaigns More wipers The aim of most targeted attack campaigns is to steal sensitive data. However, this isn’t always the goal. Sometimes attackers erase data instead of – or as well as – trying to gain access to confidential information. We’ve seen several wiper attacks in recent years. They include […] more…More information
- Internet routers hitting 512K limit, some become unreliable
- Ivanti Patches 27 Vulnerabilities in Avalanche MDM Product
- Nikjju SQL injection update (now hgbyju. com/r.php)
- Europol’s online censorship unit is haphazard and unaccountable says NGO
- Microsoft Silverlight CVE-2015-6114 Information Disclosure Vulnerability
- Georgia Tech Breach Hits Up to 1.3 Million People
- Google aims to block Flash by default for Chrome users, except for 10 white-listed sites
- Google’s chances to obtain dotless ‘http://search’ domain are shrinking
- iPhone 7 release date, price, pictures and specs
- Microsoft Internet Explorer CVE-2014-4127 Remote Memory Corruption Vulnerability