
Know your personal threat landscape
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
86 articles
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Could someone be viewing your private photos while your device is being repaired?
How to store and process personally identifiable information in a company with minimum risks.
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Which corporate assets should be first in line for protection against cyberattacks?
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Many companies throw out information that can pose a security or reputational risk.
Why the computers in human resources are especially vulnerable, and how to protect them.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.
We explain how to hide private data in images properly, without making rookie mistakes.
Why Steam users often fall victims to scams and frauds and how to avoid it.
Scammers are interested in your photos with ID cards. We explain why and how to stay protected.
Using persuasion instead of viruses: How scammers talk people into granting remote access to their computers.
The personal data of 257,000 Facebook users, including private messages belonging to 81,000 of them, has leaked online. Hackers claim to have access to 120 million accounts.