Is backdoor access oppressive? – Week in security with Tony Anscombe

Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK? If passed as a law, the UK government’s Online Safety Bill could force technology companies to give the UK government backdoor access to any end-to-end encryption systems.  The legislation itself is quite complex and the … More Is backdoor access oppressive? – Week in security with Tony Anscombe

Why business device management should keep green practices in mind

For anyone looking to delve into the sphere of green, environmentally friendly practices, it is of utmost importance to consider their habits. Among the habits we humans commit ourselves to daily is the use of phones and other electronic devices. These create a measurable impact on the environment, whether due to the way they were … More Why business device management should keep green practices in mind

Gathering dust and data: How robotic vacuums can spy on you

Mitigate the risk of data leaks with a careful review of the product and the proper settings. Since the first model hit the market in the 2000s, robotic vacuum cleaners have advanced rapidly. They can swiftly clean every corner without much bumping around, and the latest versions are close to defeating their long-time nemeses: cables … More Gathering dust and data: How robotic vacuums can spy on you

Dear all! What are some common subject lines in phishing emails?

Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. In 2014, a data breach exposed information of three billion Yahoo users. In 2016, Sony Pictures employees saw sensitive private information leaked along with thousands of company documents. What do these two attacks have in common? Both started with a phishing … More Dear all! What are some common subject lines in phishing emails?