Search Results for
POS
What is typosquatting (and how can I protect myself)?
As we navigate the internet, it’s easy to fall victim to scams that aim to trick us into revealing sensitive information or downloading malicious software.…
Under-16s Social Media Ban: A UK Government Proposal
The battle for schoolchildren’s attention has heated up again in the UK following recent comments by the government’s technology secretary. Peter Kyle recently revealed, a…
How to Make Your Phone Impossible to Track: 13 Strategies for Privacy
Modern cell phones are equipped with GPS systems that constantly record and store our location information. This is a helpful feature if you want to…
Final post of the series on our cybersecurity survey: Data privacy
Data privacy is one of the most common concerns for users who browse the Internet. More than 6 out of 10 Europeans from our survey…
Tens of Thousands of Legal Cannabis Users from the USA Exposed in a Data Breach
The details of approximately 30,000 legal cannabis customers have been accidentally exposed by a software company. The data consists of scans of ID cards.
Is it possible to ensure the privacy of electronic voting?
On May 23, the Panda Security Summit 2019 (#PASS2019) will discuss the keys to protecting against cyberattacks on public administrations.
TEMPEST and EMSEC: Is it possible to use electromagnetic waves in cyberattacks?
TEMPEST is a code name that refers to research and studies about unintentional emanations from electronic devices that can leak classified information.