The mobile phone is a logical extension to the physical person —we all have one. We organize our lives by it, from keeping fit to managing finances. They are invaluable. But in parallel with the benefits come increasing threats.
While spyware and infostealers seek to steal personal data, stalkerware is different: it steals the physical freedom of the victim. Usually installed secretly on mobile phones by ‘friends’, jealous spouses, ex-partners, and sometimes concerned parents,…
If the devastating health and economic ramifications weren’t enough, individual privacy is also in the throes of being profoundly and permanently disrupted by the coronavirus pandemic.
Email is such an integral part of everyday life we tend to ignore, or simply be unaware, that it is the biggest single threat to cybersecurity. Yet almost all cybercrime is either email-based, or employs email as part of the process.
Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level.
As we get deeper into dealing with the coronavirus outbreak, the need for authorities and experts to communicate reliably and effectively with each other, as well as to the general public, is vital.
The global Coronavirus pandemic is a terrible and frightening experience for everyone. But this virus carries its own parasites – an epidemic of cybercriminals preying on the fear of COVID-19.
A crisis brings out the worst in some people and the best in others. This is also true, I would say, of companies and even countries. Companies and countries are composed of people, of course, but I’m referring here to their leadership, or regimes, and…
We continue our series from the Digital Sanity Summit with advice from the Council of Europe’s own Dr. Elizabeth Milovidov, law professor and eSafety consultant. Dr. Milovidov is a mother herself, and she has dedicated the last seven years of her caree…
Vulnerability disclosure is the process of bringing information about flaws in operating systems, applications, firmware and business processes into the public domain. The purpose is to ensure that product vendors fix the flaws while users can mitigate…