The mantra of cyber security experts is that you shouldn’t make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small organizations easily Read >
Author: Sommet
The most successful cyber attack method is triggered by victims themselves
The nasty thing with social engineering is that the victim falls for a scam, and ultimately helps cyber criminals to achieve their goal. Typically they want to break into a large computer system or simply access the victim’s bank account. While Read >
Advertisers secretly collect email addresses from web page login forms
When you fill in a form or login to a web page, you probably expect that only the web service where you want to sign in gets your email address and password. Unfortunately, ad tech businesses that track people on the Read >
Study: Mobile apps can snatch your data before asking for permission
Researchers at Oxford University have analyzed a large number of applications developed for Android and iPhone mobile phones. There are many studies that have examined what the mobile operating systems (Android or Apple iOS) do with user data, but apps are Read >
The most in-demand tech skills in 2022
Demand for professionals who have skills to build and maintain computer systems and networks continues to increase. Popular open source projects, big tech companies, large corporations and public administration have systems are constantly developing new applications while maintaining existing programs. The Read >
Here is why cyber criminals favor phishing: it can catch up to 30% of people
When a clever phishing message or phone call happens to be delivered to a person at the right moment, it is possible that the target follows the instructions given by cyber criminals. A recent research discovered that up to 30 percent Read >
Popular passwords stay the same, but there are surprising differences between countries
In 2021, the most common password in the world still is 123456. The fourth most used password is qwerty and the fifth – what else – password. Not much has changed with the most used passwords during years, but there are Read >
What is the difference between metaverse and fediverse?
The universe is an extremely large and extremely complex entity, but new technology concepts metaverse and fediverse are rather complex as well. Metaverse and fediverse are so different concepts that it may not even be reasonable to compare them, but the Read >
Only 11 percent of internet users in Europe are fine with personalised ads
As long as enterprises have tracked internet users’ behavior and life, marketeers have explained that data is needed for personalised advertisements. They claim personal ads, rather than broadcasting the same ads to all people like on Read >
How to set up a self-hosted file storage with Filerun
More and more privacy and cybersecurity-aware people are looking for alternative solutions to popular cloud file storage services like Dropbox, Google Drive, and Microsoft Onedrive. These services have plenty of functionality, but they don’t respect your privacy, and they are also Read >