Why Canada’s Laws on Stalking Crimes are Inadequate
There was a time in her life when Anya wanted to be a neurologist. Driven and determined, she studied at the University of Guelph, in Ontario, from 2009 to 2013…
There was a time in her life when Anya wanted to be a neurologist. Driven and determined, she studied at the University of Guelph, in Ontario, from 2009 to 2013…
As a remote worker, it's expedient that you're cautious of cybersecurity threats. You need to monitor your Wi-Fi networks to ensure they are safe enough to access sensitive data. This…
Listening bugs were created to gather evidence from police officers or government agencies. This technology is cheap and easily accessible, so people misuse it to eavesdrop on homes and business…
It used to be that we thought of government surveillance as something that happened under authoritarian regimes. Yet in recent times, there has been an explosion of surveillance and intrusion…
Privacy protection while traveling can be a challenge. Whether you are traveling for work or for pleasure, you face an elevated risk of technical surveillance in rentals, no matter how…
If you regularly use ATMs, you might have heard the term “jackpotting” in the headlines. Although this has been around for a little while, jackpotting has become an increasingly popular…
Brussels, as nearly everyone knows, is packed with spies. They’re hovering at the bar at the think tank networking event. They’re raising their hand in the press room at European…
Sometimes, the most dangerous attacks aren’t blatant attempts to take you down in one fell swoop. Ironically, the most devastating attacks are those that lie in wait, quietly working in…
Businesses face several security risks daily. From employee theft to vandalism and robberies, it’s imperative to take measures to protect your business keep potential threats at bay. One way to…
When you own your own business, you’re the one who calls the shots. You decide when and where you work, whom you hire, and what services or products your business…
Since the earliest days of computing, passwords have been the go-to method for securing sensitive data and restricting system access. Now, nearly every digital account, tool, system, and even many…
OT: A maturing landscapeSecurity professionals who spoke with TechTarget Editorial generally agreed that OT security is improving overall. But they also generally agreed that an industry-wide lag exists in organizations…
A group of researchers studied 15 months of human mobility movement data taken from 1.5 million people and concluded that just four points in space and time were sufficient to…
When an online ad seems far too accurate or someone in your life seems to know more about you than you’d ever mentioned, it’s natural to ask the question: “is…
Over 3.5 million active Chinese-manufactured IP cameras are only protected by a vendor’s default , or lacking protection altogether, putting users at risk of snooping, experts have warned..New research from…
Aside from inflation, few topics today generate as much digital ink as employee monitoring. The business press, and even some mainstream news outlets, have been filled with articles expressing concerns…
Many people are eager to celebrate the beauty of the holiday season with parties, parades, poinsettias and presents. For some, the holidays are truly a special time, radiating a cheer…
USB drives are incredibly convenient and widely used. Unfortunately, that means some cybercriminals capitalize on their popularity and weaponize them as attack methods.Here are some ways to tell if a…
It seems like a worst-case scenario from a TV show’s exposé. You check into your vacation rental and start relaxing, only to find out that the owner of the rental has…
With the increased cost of housing, inflation, and unemployment caused by the Covid-19 pandemic, the U.S. is facing record-high numbers of homelessness. As of January 2020, more than 580,000 people…
Search giant Google has agreed to a $391.5 million settlement with 40 states to resolve an investigation into how the company tracked users’ locations, state attorneys general announced Monday.The states’…
As useful and convenient as the internet can be, it can also sometimes be a dangerous place. Cybercriminals are constantly creating new ways to cause chaos, whether through malicious DDoS attacks, or…
Whether we realize it or not, GPS signals are a vital part of everyday life. Everywhere, constantly, we use GPS to navigate the world. From using maps apps on our…
Listening bugs were created to gather evidence from police officers or government agencies. This technology is cheap and easily accessible, so sometimes people misuse it to eavesdrop on homes and…
Every year, Computer Security Day reminds digital citizens of the importance of taking ownership of their online presence, security and identity. To help maintain your cyber resilience throughout the upcoming…