Hackers can control damaged phones using replacement screens

Replacement screens for cracked smartphones bought from third party vendors could leave you vulnerable to hackers, a new study has revealed. The research, carried out by Israel’s Ben-Gurion University of the Negev, has shown how hackers can use replacement screens to override and steal data from the refurbished phones. Worryingly for users, the attack on these … More Hackers can control damaged phones using replacement screens

Enable Ghost Mode in Snapchat NOW if you want to keep your location private

Hands up. I admit it. I’m not really of the Snapchat generation. Somehow or another I manage to make my way through daily life without feeling the need to chat with online friends through the incredibly popular (apart from in my house) smartphone app. Frankly, I’m worried – rightly or wrongly – that there might … More Enable Ghost Mode in Snapchat NOW if you want to keep your location private

Trends 2017: Fewer vulnerabilities are being reported, but are we any safer?

The rapid global spread of technology, and the increasingly numerous types of interconnected devices routinely used, have greatly increased the number of attack vectors available to cybercriminals. This is why the exploitation of vulnerabilities is still one of our major concerns when it comes to corporate security incidents around the globe. For more detail, check out … More Trends 2017: Fewer vulnerabilities are being reported, but are we any safer?

ICO urges businesses to focus on becoming GDPR compliant

The UK’s information commissioner Elizabeth Denham has urged businesses to be incentivized by the benefits of GDPR data security compliance, rather than the possible consequences. In a video addressing boardrooms across the country, Denham stated that businesses should not waste any time in preparing for “the biggest change to data protection law for a generation”. As … More ICO urges businesses to focus on becoming GDPR compliant

Surveillance, cybersecurity, and the future of privacy in The Circle

If surveillance, cybersecurity, and privacy are things you think about a lot, you should find The Circle, a new movie based on Dave Eggers’ 2013 novel of the same name, interesting viewing. This is one of two recent films that reflect how central these issues have become to modern life and popular culture (the other is … More Surveillance, cybersecurity, and the future of privacy in The Circle