Access link has been sent to your email/mobile Thank You!
Don’t have your account yet?Sign Up
Passwords: they guard the innards of our private lives, as well as hold the key to the backdoor of so many businesses and important organisations. So, when you cannot get into to your computer or smartphone, and you do not have biometrics set up, your backup option is a pin code. But why is this? Why is it not a password? Let’s explore…Read More
You have probably heard about cryptocurrency, with its popularity having risen sharply in recent years. But what is cryptocurrency, and what are the potential implications on cybersecurity? What is cryptocurrency? Broadly, cryptocurrencies are a form of virtual money, or digital currency. They function using something known as blockchain technology. A blockchain is a digital ledger of transactions...Read More
With more than 80% of the global market share, Android dominate the world of smartphones. There are numerous threats to the average smartphone user, from malicious apps to phishing links, insecure public networks to cryptocurrency malware, most of which are not unique to Android. However, a recent study from the University of Cambridge revealed that almost 87% of all Android devices are insecur...Read More
A recent Verizon data breach report stated that small businesses are the target of 43% of cyber-attacks. Cybersecurity can be daunting for small business owners, who may not have the resources or infrastructure to support dedicated IT staff, the knowledge to create a comprehensive computer and network security strategy or the ability to implement training programs for employees and associates...Read More