October 23, 2020
stop Facebook from using my data

How to stop Facebook from using my data?

All Facebook subscribers will probably be aware that the social network stores various information about users: this allows the company to offer targeted advertising that reflects each subscriber’s interests to the platform. Let’s see how to stop Facebook from using my data. However, there are plenty of reasons why you want to limit the amount of personal information you share with Zuckerberg’s social network, first and foremost, a greater focus on your privacy. How to stop Facebook from using my data? Let’s start from the obvious: to eliminate any sharing of personal data and prevent Facebook from obtaining new ones, the only thing to do is completely unsubscribe from FB. If you don’t know-how, we refer you to our guide on this: But probably not everyone is willing to such a drastic solution, so we propose two alternatives aimed at limiting the sharing of personal data with third-party applications. An effective way to protect your personal information is to disable the use of apps, sites, and plugins connected to Facebook. This will prevent your data from being collected and used by third-party applications that connect to the social network (i.e., that use its APIs). Obviously, this will also prevent you […]
August 28, 2020

How to know if remote access is secure at your company

Employers have transferred employees to remote work to protect them from the coronavirus. But not all companies have taken care of their own protection, although remote access – VPN, DaaS, RDP, etc. – is a type of connection that requires a change in the monitoring focus and special measures to protect against cyber attacks. These measures are somewhat different from traditional ones when employees (and their work devices) are inside the corporate security perimeter. There is a whole list of reasons for this – from vulnerabilities in protocols and technologies of remote access, to the fact that employees connect to the internal network from personal devices that are not even protected by antivirus. To conduct a quick and comprehensive assessment of the security level of remote access, the best option is to organize a penetration test. The essence of the method is as follows. The company turns to a third-party organization – experts in information security (IS), who simulate various options for cyberattacks. Using special software and manual hacking methods, experts identify all kinds of risks, errors, and “holes” in the information system, including those critical for remote access. After that, the customer receives a detailed report with a description […]
August 28, 2020

Top 5 main CyberSecurity risks in 2020

Top 5 main cybersecurity risks in 2020 The past year in terms of cybersecurity was remembered for APT attacks on organizations in the financial sector, high-profile data leaks, and the search for hardware vulnerabilities by cybercriminals. While the management of the companies was looking for an adequate response to the threats, cybercriminals are entering the warpath with new means and schemes. A shift in focus from desktops to devices and hardware Hackers are less and less interested in personal computers. Instead, they pay close attention to network devices, video cameras, IoT equipment, unmanned vehicles, and others. According to Avast experts, cybercriminals will protect spyware more effectively, making it much more difficult to detect them. Artificial intelligence versus humans Artificial intelligence technologies are actively used to protect against hacker attacks. The latter are increasingly responding with “courtesy” and using AI for their own ends. According to Avast Smart Home Report, in 2019, 44% of smart homes had at least one compromised equipment. In 2020, vulnerable IoT devices will increasingly integrate into intelligent botnets like Swarm to launch cyberattacks. It is possible that they will be able to make decisions without the participation of criminals and will be able to autonomously generate […]
August 28, 2020

5 ways smartphones track disease and health

Since the introduction of the first iPhone in 2007, smartphones have been used everywhere. One area where devices have new perspectives is in medical diagnostics. Gadgets may soon change how we detect diabetes, measure female fertility, or detect cancer. The computing power of modern smartphones, together with high-quality cameras and a set of constantly updated sensors, makes the devices suitable for all kinds of tasks. In medicine, scientists are making advances that use these capabilities to diagnose various conditions in patients. Here are some examples. Female fertility test using a smartphone A smartphone can make home fertility testing cheaper and easier. Similar technology was developed by scientists from Brigham Young University (USA) and demonstrated in 2018. The test consists of a slide onto which a saliva sample is applied. As the liquid dries, it crystallizes into a fern-like structure. Well-defined patterns can reveal where an object is in the menstrual cycle. The smartphone camera and a special application do all the further work on the sample analysis. Experiments show that the smartphone can determine the ovulation phase of the menstrual cycle with 99% accuracy. This can be the key to a successful conception. Definition of type 2 diabetes A smartphone-based […]