Encryption can be the answer to many data security issues faced by small and medium businesses. Not only can it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General Data Protection Regulation (GDPR). But in … More Avoid getting lost in encryption with these easy steps
Reviewing a lease, preparing a favorite recipe, applying for a loan … these are all things a typical college student might ask parents how to do. But these days, students are more likely to turn to a quick internet search for answers to just about everything. Parents, however, still tend to depend on their children … More Having “the talk” with parents — the tech talk, that is
Congratulations, you’re famous. You’re paid a small fortune to prance around exotic occasions, saying other people’s words, accompanied by CGI dragons… and millions of people are glued to your antics every week on TV. Yes, you’re an actor on HBO’s hit TV show “Game of Thrones.” Of course, fame isn’t all it’s cracked up to … More Game of Thrones stars’ personal phone numbers leaked, as HBO hackers attempt to extort ransom
Update, Aug 7 – 17.30 CEST: We updated the article to address concerns from vendors that considered it was targeted rather than being about the free eco-system, as was intended. We are all familiar with the concept ‘there is no such thing as a free lunch’. There is always an agenda that involves us giving … More What’s the cost of a free lunch?
Despite their popularity among users, torrents are very risky “business”. Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to downloading them that could put you or your computer in the crosshairs of the black hats. Merely downloading the newest version … More Why you should view torrents as a threat
Regular readers of We Live Security will know that we have long been proponents of internet users protecting their privacy by installing a VPN on their computers, tablets, and smartphones. Don’t know what a VPN is? Watch this video from ESET. Ok, so hopefully we’re all up to speed and understand the importance of running a VPN. But depending … More iOS VPN apps removed from Apple’s Chinese App Store
By 2020, the number of Internet of Things devices is estimated to surpass 20 billion. From smart fridges to coffee makers and Barbie dolls, connected things will soon fill our households. Many of these devices are, and will continue to be, accessed via our smartphones. While this is very convenient for users, there are weaknesses in smartphone security that can be exploited to turn … More Are smartphones threatening the security of our IoT devices?