Taking a selfie with your ID card — is it safe?
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
90 articles
Many popular online services these days require a selfie with your ID card or passport to register. We explore whether taking such photos is safe (spoiler: it’s not) and how to minimize the risks.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Training AI requires a colossal amount of data. Meta seems to have found a “brilliant” solution — using the personal data of its own users.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
Here’s how to set up Threads to make your profile both private and secure.
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Could someone be viewing your private photos while your device is being repaired?
How to store and process personally identifiable information in a company with minimum risks.
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Which corporate assets should be first in line for protection against cyberattacks?
To minimize cyberincidents, issue a basic information security guide and make it compulsory reading for onboarding employees.
Many companies throw out information that can pose a security or reputational risk.
Why the computers in human resources are especially vulnerable, and how to protect them.
The online battle royale shooter attracts not only virtuoso gamers, but also crooks of every stripe. How can you avoid becoming a victim?
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
The dangers of pirated games, activation codes on gray-market sites, and ready-made accounts in official stores.