Total 21 Posts
A few tips on how to handle ransom or extortion e-mails.
Given how easy it is to make payments and how NFC enabled credit cards they require no user input, they present a security risk.
If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates. Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices. On the evening of Friday the 24th of October 2008
Have you ever had your personal information leaked on the internet? Maybe it was something you purchased online from a website, only to find out that the company was hacked months later? If the answer is “yes”, you probably want to know whether the breach was reported and dealt with.
With cryptocurrency fraud and IRS scams making headlines, I had thought Nigerian email schemes were a thing of the past, akin to the bygone days when a scammer might offer to sell you the Brooklyn Bridge. So I was surprised to recently come across an article about a 62-year-old Swedish
Liberty Group (“Liberty”) released a communication on 18 June 2018, advising that “it has been subjected to illegal and unauthorised access to its IT infrastructure”. The data that was the subject of the breach seemed to be “largely emails and possibly attachments.” GDPR background About 3 weeks before that, on
Protecting individual privacy from government intrusion is older than American democracy. In 1604, the attorney general of England, Sir Edward Coke, ruled that a man’s house is his castle. This was the official declaration that a homeowner could protect himself and his privacy from the king’s agents. That