The Latest in IT Security

1

Cyber security automation may represent a relief for specialists. With its unmatched potential of big data processing, automation in this field is the only foreseeable counteraction once the global-scale Internet of Everything provides a new playing field for hackers everywhere

Read more ...

1

What happens to the victims of data theft, once hackers get hold of their identity? We were tempted to say “digital identity”, but that would not have been complete. Once the personally identifiable information (PII) or sensitive personal information (SPI) is in the hands of malicious entities, it can affect the real-life identity of the […]

Read more ...

1

Unfortunately, often in the digital environment what makes things faster and easier is riddled with cyber security risks. This time, it is about the autofill feature. Finish specialist Viljami Kuosmanen illustrated how easy it is for third parties to get private user data via autofill storage. The culprit software is the Chrome browser, whose autofill […]

Read more ...

1

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy number one in 2017.

Read more ...

Categories

MONDAY, MARCH 27, 2017

Featured

Archives

Latest Comments

Social Networks