Controlling access is the basis of all security. The right people should be allowed in, and the wrong people kept out. This is done by confirming – or authenticating – the identity of the person seeking access, and then checking that the person is auth…
Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money – phishing is unique in seeking your personal data, usually in the…
Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.
The mobile phone is a logical extension to the physical person —we all have one. We organize our lives by it, from keeping fit to managing finances. They are invaluable. But in parallel with the benefits come increasing threats.
While spyware and infostealers seek to steal personal data, stalkerware is different: it steals the physical freedom of the victim. Usually installed secretly on mobile phones by ‘friends’, jealous spouses, ex-partners, and sometimes concerned parents,…
If the devastating health and economic ramifications weren’t enough, individual privacy is also in the throes of being profoundly and permanently disrupted by the coronavirus pandemic.
Email is such an integral part of everyday life we tend to ignore, or simply be unaware, that it is the biggest single threat to cybersecurity. Yet almost all cybercrime is either email-based, or employs email as part of the process.
Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level.
As we get deeper into dealing with the coronavirus outbreak, the need for authorities and experts to communicate reliably and effectively with each other, as well as to the general public, is vital.
The global Coronavirus pandemic is a terrible and frightening experience for everyone. But this virus carries its own parasites – an epidemic of cybercriminals preying on the fear of COVID-19.