The risk of using phone numbers as authenticators for sensitive information
Find out how using mobile phones to authenticate sensitive information and accounts can pose a risk to your company’s cybersecurity.
Which is the safest smart speaker?
Smart speakers – like any internet-connected device – could be a potential security problem. So which is the safest?
Beware this malware: it can even survive operating systems being reinstalledÂ
LoJax is a piece of malware that is able to survive an operating system being reinstalled making it especially dangerous for companies and institutions.
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.
Is your smartphone also your computer?
Our computing habits have changed over the years – has your smartphone become your main computer?
Who is to blame for the majority of data breaches?Â
A report has shown that in the United Kingdom the number of security incidents that have led to data breaches has grown by 75% in the last two years.
What is Machine Learning – and how can it protect you?
A new technology called “Machine Learning” is changing the way companies process and analyse information. So, what is Machine Learning?