Your data is very, very valuable to the right (or wrong) people. Every single piece of data has value, it doesn’t matter how mundane it might seem, any and all data can be used to build up a profile of you for advertisers or could be the key to accessing your online accounts. Jake Moore, … More How do companies use your data?
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Fraudsters are using bogus apps to convince users of three Indian banks to divulge their personal data. Another set of fake banking apps has found its way into the official Google Play store. Claiming to increase the credit card limit for users of three Indian banks, the malicious apps phish for credit card details and … More Fake banking apps on Google Play leak stolen credit card data
ESET Ireland looks at the latest scam targeting Irish users, using their passwords as bait, mentioning adult websites and trying to extort large sums of money. “It is just so unfortunate. I’m aware login123 is your password. More importantly, I know about your secret and I’ve evidence of this,” says an email received by many … More They have my password, now they’re blackmailing me!
Since a patch for the flaw has already been released, users are well advised to make sure that they’re running the browser’s most recent version. A Google developer has discovered a high-severity loophole that affected the Microsoft Edge web browser and, less so, Mozilla Firefox, and that could provide an attacker with access to the … More Microsoft Edge bug could be exploited to spill your emails to malicious sites
World Password Day, celebrated on the first Thursday of every May, is a timely reminder of the fact that our passwords are the key to a wealth of personal information about us. It would be nice to imagine that if the various contenders for “inventor of the password” had known how much of a hassle … More Recycling is a must, but why would you reuse your password?
In October 2017, researchers made public a serious vulnerability in WPA2, the security protocol that protects most of today’s WiFi networks. This discovery put the protocol’s security in the spotlight and led to discussions about the need for a new standard. Finally, the WiFi Alliance, the organization that certifies WiFi devices, announced WPA3, a new and enhanced authentication … More How will WPA3 improve WiFi security?