The August Trojan: Tips on how you can protect yourself

fb linkedin protection policy

The August Trojan is a new and very dangerous form of malware that is causing havoc to many people around the world. Hackers are using this new form of malware to steal the personal credentials that individuals use on instant messaging services as well as for cryptocurrencies. Here are tips about the malware and how you can protect yourself from it. Continue reading “The August Trojan: Tips on how you can protect yourself”

Uber App’s New Updates and Your Security

Uber App’s New Updates and Your Security

Uber, the popular taxi-hailing app, has released new updates to its app. The new updates have caused uproar because of what many people consider to be an attempt by the company to intrude into the privacy of individuals. The crux of the matter is that now, the app requires you to allow it to track your location even when it is running in the background. The app also asks you to let it monitor your movement for five minutes after you alight from a cab. Here are three things about this recent update of the app that you need to know. Continue reading “Uber App’s New Updates and Your Security”

How to Apply Operations Security (OPSEC): 3 Steps

How to Apply Operations Security (OPSEC): 3 Steps

Operations security helps to secure your data from hackers, spies and other people or institutions who would like to access your data. In the current times, you need OPSEC more than ever. Governments across the world are passing laws that they can use to access your data at will. Moreover, cybercriminals are developing new hacking methods. Hence, as an individual as well as an organisation, you need OPSEC to secure your data. Here are three key steps you can use to implement OPSEC. Continue reading “How to Apply Operations Security (OPSEC): 3 Steps”