
Interview: Privacy – Effective Protection of Your Data on Smartphone and Internet
The podcast Perspektive Ausland invited me to talk about how you can protect yourself and why data protection should be an important topic for all of us.
The podcast Perspektive Ausland invited me to talk about how you can protect yourself and why data protection should be an important topic for all of us.
The case revolves around Bhakdi’s controversial views on the COVID-19 pandemic, which have been shared in interviews and on social media, garnering both widespread support and fierce criticism since the onset of the global health crisis.
Conferences and other personal events are increasingly using facial recognition for participants. Often, the necessary diligence regarding data protection risks is lacking. This risk must also be recognized by everyone attending such events.
The plaintiffs [those who believe their phones were hacked] claim that journalists from the Daily Mirror, the Sunday Mirror, and the People Magazine obtained private and confidential information about their lives through a variety of illegal means.
A new online tool makes it as simple as giving your own voice to artificial intelligence. The next step in the “humanization” of AI.
In a new discovery, Cyble Research and Intelligence Labs (CRIL) recently identified new malware named Atomic macOS Stealer (AMOS) on Telegram, targeting macOS users. The malware is specifically designed for macOS and can steal sensitive information from the affected computer. Mac users should be wary of this malware and check their systems for possible signs of infection. The creators of AMOS are continuously working on improving the malware by adding new features and making it increasingly effective.
Google recently introduced its Passkeys, a feature that allows users to log into their accounts with their Android phone as a security key. However, some experts are concerned about the implications for privacy.
At the third edition of CYSAT, a European event focused on cybersecurity for the space industry, the European Space Agency (ESA) set up a satellite test environment and invited white-hat hackers to attempt taking control of OPS-SAT, a nanosatellite operated by the agency for demonstration purposes.
In our digital world, cybersecurity is more important than ever. As hackers become more sophisticated in their methods, it is essential to understand how they work in order to better protect yourself and your data.
Thousands of employees have access to your camera and audio:
All the data collected by tech companies is sent to these AI data labeling companies that profit from tagging your images, transcribing your audios, and pinning your location, online purchases, and browsing history.
7 ways Big Tech is stealing your data right now, and how to stop it in 10 minutes.