Who has access to your real-time location data?
Wireless carriers and middlemen-companies are not always fully aware how the data is being used and do not have an effective way to monitor if consents are obtained.
How can I stop an unexpected Windows 10 update?
Waiting for Windows 10 update to complete seems to take forever – especially when the process launches unexpectedly. Learn how to delay installation until a time that is more convenient for you.
Everything you need to know about cryptojacking
Cryptomining is a tactic that is becoming more and more popular among cybercriminals. Find out more about the emerging trend of cryptojacking, and what its consequences are.
52% of users reuse their passwords
Researchers have carried out a study on password reuse and modification patterns. They have uncovered an alarming figure: 52% of the users studied have the same passwords for different services.
Two-Factor Authentication Isn’t Foolproof
Two-factor authentication is a great breakthrough for security, but by no means does it mean that our job here is done and we can now put our feet up.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.