What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
As users are losing access to their accounts by the dozens, we offer a few tips to help keep your streaming subscriptions safe. The long-awaited streaming service Disney+ was launched to the cheers of many. But it wasn’t without technical issues; in addition, within hours of the service going online many users were reporting that … More Disney+ accounts hacked – How to protect yourself
An ESET-commissioned survey among enterprises also shows that while respondents in most countries agree on the need to bolster cyber-defenses, some are reluctant to adopt cybersecurity solutions. As technology evolves by leaps and bounds every year, so does the threat landscape and bad actors keep coming up with new threats. That’s not scaremongering, it’s a … More Can regulations improve cybersecurity? In APAC, opinions vary
Even if you are careful about what you download, chances are your children will be less cautious. Here’s how you can help them – and your entire family – stay safe… Life without the internet is rather difficult to fathom, and particularly for children the online world holds a magical allure. While many parents are becoming … More Safe downloading habits: What to teach your kids
How can organizations foster a workplace environment that enables employees to acquire the skills needed to keep cyber-threats at bay? Since human error has a well-documented history of causing many breaches, no organization can afford to overlook the importance of ensuring that its employees are aware of online dangers. This is mainly why the first instalment in our … More Five ways to strengthen employee cybersecurity awareness
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here’s what your organization should focus on instead. When we hear about breaches, we assume that attackers used some never-before-seen, zero-day exploit to breach our defenses. This situation is normally far from the truth. While … More What you may be getting wrong about cybersecurity
The study tested 81 IoT devices to analyze their behavior and tracking habits, and in some cases brought rather surprising findings. Have you stopped to think what kind of data may be collected by an innocuously-looking smart device, where the information is sent, and whether it is encrypted? Researchers at Northeastern University and Imperial College … More Your smart doorbell may be collecting more data than you think, study finds