Editorial

Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)
Editorial Another day, another demo exploit – this time, Chrome is the tattletale (autofill vulnerabilities)

Unfortunately, often in the digital environment what makes things faster and easier is riddled with cyber security risks. This time, it is about the autofill feature. Finish specialist Viljami Kuosmanen illustrated how easy it is for third parties to get private user data via autofill storage. The

Mass surveillance, the invisible cyber enemy lurking in the future
Editorial Mass surveillance, the invisible cyber enemy lurking in the future

Surveillance is a passive cyber-threat. It does not block computers or alter the software. It is just lurking in the shadows, taking note of every single action cyber-users perform. According to a MonsterCloud report, mass surveillance is the public enemy number one in 2017. It managed to even

Data Brokers and why is privacy protection valuable
Editorial Data Brokers and why is privacy protection valuable

During a recent conversation I was surprised to find out that not all people understand the value of privacy protection. Unless confronted with the perspective of their data ending up in malicious hands, of course. However, when talking about privacy rights and their importance in the online

Will empowering AI equal weakening privacy protection?
Editorial Will empowering AI equal weakening privacy protection?

As it turns out, Google wants to employ Artificial Intelligence in moderating online communications. This activity implies a fine balance between the freedom of expression and various preset policies. These may involve anti-harassment measures or even cyber-security guidelines that moderate what

Yahoo breaches – what were the signs?
Editorial Yahoo breaches – what were the signs?

Yahoo breaches have become similar to Adobe Flash patches – one seems to hear about them endlessly. The company strives to explain and investigate. Yet there is even more to add to the damage report as time goes by. On top of this, cyber scammers and cyber-attackers may well take advantage of the u

Machine to machine communication needs better security
Editorial Machine to machine communication needs better security

It is not hard to decode M2M technology, even for the less experienced of us. An abbreviation for machine to machine communication, M2M involves networked devices communicating among themselves. Without any manual assistance from humans, that is. M2M and IoT While IoT is all the tech online buzz

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later