Follow the money. It is the traditional advice for everyone who wants to understand why someone is doing something that is not obvious. If I ask: why are big and small technology businesses collecting personal data of people and tracking their Read >
Author: Sommet
Has security and privacy in web browsers improved since the last year?
Security and privacy features in a number of web browsers have improved since the last time we checked a year ago. Since most browser developers claim that their browser is secure and protects your private data from tracking, the valuable insight Read >
How does a small business recover from a cyber security incident?
The mantra of cyber security experts is that you shouldn’t make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small organizations easily Read >
The most successful cyber attack method is triggered by victims themselves
The nasty thing with social engineering is that the victim falls for a scam, and ultimately helps cyber criminals to achieve their goal. Typically they want to break into a large computer system or simply access the victim’s bank account. While Read >
Advertisers secretly collect email addresses from web page login forms
When you fill in a form or login to a web page, you probably expect that only the web service where you want to sign in gets your email address and password. Unfortunately, ad tech businesses that track people on the Read >
Study: Mobile apps can snatch your data before asking for permission
Researchers at Oxford University have analyzed a large number of applications developed for Android and iPhone mobile phones. There are many studies that have examined what the mobile operating systems (Android or Apple iOS) do with user data, but apps are Read >
The most in-demand tech skills in 2022
Demand for professionals who have skills to build and maintain computer systems and networks continues to increase. Popular open source projects, big tech companies, large corporations and public administration have systems are constantly developing new applications while maintaining existing programs. The Read >
Here is why cyber criminals favor phishing: it can catch up to 30% of people
When a clever phishing message or phone call happens to be delivered to a person at the right moment, it is possible that the target follows the instructions given by cyber criminals. A recent research discovered that up to 30 percent Read >
Popular passwords stay the same, but there are surprising differences between countries
In 2021, the most common password in the world still is 123456. The fourth most used password is qwerty and the fifth – what else – password. Not much has changed with the most used passwords during years, but there are Read >
What is the difference between metaverse and fediverse?
The universe is an extremely large and extremely complex entity, but new technology concepts metaverse and fediverse are rather complex as well. Metaverse and fediverse are so different concepts that it may not even be reasonable to compare them, but the Read >