If someone didn’t have an opportunity to attend a videoconference earlier, during the pandemic most people joined a lecture, meeting, or family reunion online. An essential feature of a videoconferencing application is the ability for participants to mute their microphones … Read the story...
Category: Security
Study: Mobile apps can snatch your data before asking for permission
Researchers at Oxford University have analyzed a large number of applications developed for Android and iPhone mobile phones. There are many studies that have examined what the mobile operating systems (Android or Apple iOS) do with user data, but apps … Read the story...
The best browsers for protecting your private data and preventing tracking
Browser is one of the most used applications on computers, and frequently accessed app on tablets and phones. It has become a universal tool for everything from banking to social media and other cloud services. Browsers provide plenty of information … Read the story...
Here is why cyber criminals favor phishing: it can catch up to 30% of people
When a clever phishing message or phone call happens to be delivered to a person at the right moment, it is possible that the target follows the instructions given by cyber criminals. A recent research discovered that up to 30 … Read the story...
Popular passwords stay the same, but there are surprising differences between countries
In 2021, the most common password in the world still is 123456. The fourth most used password is qwerty and the fifth – what else – password. Not much has changed with the most used passwords during years, … Read the story...
Android phone comparison: the best and worst products for privacy
When the first smartphones were introduced about 20 years ago by a number of telecommunication equipment vendors, the mobile device was expected to become the primary communication tool for the majority of human kind. It did. But there was something … Read the story...
Improve your PC security with task-specific browsers
When we are using a PC – a Windows, Mac, or Linux computer – web browsers tend to be one of the most accessed applications. Unfortunately, web browsers are frequent attack targets because they can run Javascript programs on a … Read the story...
Why we don’t sync our PCs and mobile devices
So you have a mobile phone, tablet and a laptop, but the file you need to view on your phone is saved on the laptop’s hard drive. Fortunately, apps and cloud services that can sync (synchronize) files between mobile devices … Read the story...
Security report: over 70 million WordPress sites are running vulnerable plugins and themes
In the world of cyber crime getting access to web sites that are powered by a popular software like WordPress opens doors to large scale attacks or perhaps to ransomware revenue. WordPress has over 40% market share of web site … Read the story...
We are doomed: cyber arms race affects our daily life and work
The book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race is both fabulously entertaining and scary to read. The author, The New York Times journalist Nicole Perlroth, spent seven years researching and talking to hackers, … Read the story...