Unfortunately, often in the digital environment what makes things faster and easier is riddled with cyber security risks. This time, it is about the autofill feature. Finish specialist Viljami Kuosmanen illustrated how easy it is for third parties to get private user data via autofill storage. The
Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy number one in 2017. It managed to even
During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy rights and their importance in the online
As it turns out, Google wants to employ Artificial Intelligence in moderating online communications. This activity implies a fine balance between the freedom of expression and various preset policies. These may involve anti-harassment measures or even cyber-security guidelines that moderate what
Yahoo breaches have become similar to Adobe Flash patches – one seems to hear about them endlessly. The company strives to explain and investigate. Yet there is even more to add to the damage report as time goes by. On top of this, cyber scammers and cyber-attackers may well take advantage of the u
It is not hard to decode M2M technology, even for the less experienced of us. An abbreviation for machine to machine communication, M2M involves networked devices communicating among themselves. Without any manual assistance from humans, that is. M2M and IoT While IoT is all the tech online buzz