Featured Blogs
5 Hidden Hashtag Risks Every Parent Needs Know
Adding hashtags to a social post has become second nature. In fact, it’s so common, few of us stop to...
Is Your Medical Data Safe? 16 Million Medical Scans Left Out in the Open
Have you ever needed to get an X-ray or an MRI for an injury? It turns out that these images, as...
Chapter Preview: It All Starts with Your Personal Data Lake
Once, not long ago, data was nestled in paper files or stored on isolated computer networks, housed in glassed-off, air-conditioned...
Solving the Gamer’s Dilemma: Security vs. Performance
As of last year, 2.2 billion1 people consider themselves gamers across the globe. Of that 2.2 billion, over 50% – 1.22...
Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know
I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas,...
Millions of Car Buyer Records Exposed: How to Bring This Breach to a Halt
Buying a car can be quite a process and requires a lot of time, energy, and research. What most potential...
How To Practise Good Social Media Hygiene
Fact – your social media posts may affect your career, or worse case, your identity! New research from the world’s...
Iron Man’s Instagram Hacked: Snap Away Cybercriminals With These Social Media Tips
Celebrities: they’re just like us! Well, at least in the sense that they still face common cyberthreats. This week, “Avengers:...
How Visiting a Trusted Site Could Infect Your Employees
The Artful and Dangerous Dynamics of Watering Hole Attacks A group of researchers recently published findings of an exploitation of multiple...
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the...