Blog
What is Ransomware-as-a-Service (RaaS Model Explained)
A ransomware attack is one of the better known and most feared online security threats and each year it gets worse. So what is behind this growth of ransomware attacks? Many things, but one in particular – ransomware-as-a-service (RaaS). What is a Ransomware Attack? To understand the ransomware-as-a-service, we need to understand the ransomware attack itself and know […]
November 30, 2023
What is a Data Leak and How to Handle One?
Losing your data is bad, but having it exposed in a data breach is even worse. The problem is getting worse every year, with more and more data leaks happening and affecting both small and large businesses, without prejudice. Your business could also be at risk of a data leak, without you even realizing it. […]
Google Privacy Sandbox Coming to Android
Although Google’s Privacy Sandbox initiative wasn’t met with the universal praise that was expected (one Reddit user called it a “consumer-friendly speak for unknowingly opting in to FLoC”), the company seems to like it well enough to bring Privacy Sandbox to Android apps and devices. Let’s find out what this means for the digital advertising industry and user data privacy […]
How to Protest Without Sacrificing Your Digital Privacy: A Data Security Guide for Online Activists
On 24th February, Russia attacked Ukraine. On the same day, anti-war protests were held in several Russian cities. These protests were quickly dispersed by the Russian police, arresting around 2,000 people. Of course, the protests didn’t end there and according to an independent human rights media project against political persecution, OVD-Info, a total of 6,858 anti-war […]
Why Data Security Management is Important for Your Business Continuity?
If you want to understand your customers better and to make better business decisions, you need to collect the right data. However, you also need to be aware of the various data security threats that loom above such as hackers and data breaches and do everything that you can to protect your digital information from […]
Your “Right to Privacy”: What Do the Constitution and the Law Say?
You’ve probably heard the phrase “Life, Liberty and the pursuit of Happiness” from the U.S. Declaration of Independence. While not legally binding, this motto is the cornerstone of the United States government and the Constitution. This, of course, isn’t the only such motto. The French have “Liberte, Egalite, Fraternite” (Liberty, Equality, Fraternity), the British“Peace, Order and Good […]
Security and Privacy in the Metaverse: How to Keep Your Virtual Life Safe?
On 28th October, 2021, Mark Zuckerberg, the CEO of Facebook, introduced a radical change to the biggest social network and his other services at the Connect 2021 conference. That change was the shift from the digital world and social media platforms to augmented reality and virtual reality, or the metaverse (the term coined first by […]
October 26, 2023
What is Cyber Warfare and How is Cyber War Waged?
Despite the current conflict in Ukraine, our modern society sees a lot fewer armed conflicts than 3-4 decades ago for instance. Most countries realize that it’s better to “play nice” with others, rather than pull out their guns and risk the lives of their people for what usually amounts to little to no gain. That […]
April 17, 2022
How to Detect Stalkerware Apps on Your Mobile Device and Protect From it?
Put down your mobile phone for a moment. Someone might be spying on you as you are using it. In this article, we’ll explain how to detect stalkerware on your both Android and iPhone mobile devices and how to protect yourself from it. What is Stalkerware? In 2019, Google discovered and removed 7 stalkerware apps […]
April 13, 2022
What is the Difference Between XSS vs CSRF Attacks and How to Prevent Them?
XSS and CSRF are two of the most common client side attacks. However, they are very different. In this article, we’ll take a look at the difference between XSS vs CSRF attacks and what you can do to prevent these two attacks. What is a Client Side Attack? Before we start explaining what are XSS […]
April 10, 2022