Have you ever chatted to a friend about buying a certain item and been targeted with an ad for that same item the next day? If so, you may have wondered whether your smartphone was “listening” to you.
Browsing: Information security
What we find when we connect the dots is a professional industry far removed from the organised crime playbook.
Promoted | Forrester believes security leaders are best placed to respond to the increasingly sophisticated attacks with a Zero Trust Model.
Apple CEO Tim Cook has taken aim at proposed European rules aimed at curbing the power of US technology giants, saying they could pose security and privacy risks to iPhones.
Promoted | We’ve all heard of phishing, the tried-and-tested e-mail scam that spoofs authoritative sources to trick recipients into handing over sensitive information. Vishing is its voice call equivalent.
Apple on Monday said a new “private relay” feature designed to obscure a user’s Web browsing behaviour from Internet service providers and advertisers will not be available in China – or South Africa.
Apple stores data from its Chinese customers in servers owned by a Chinese state-owned company, potentially making it easy for the government to gain access to the information, the New York Times reported.
While clearly useful, Apple’s new AirTags can also potentially be misused. Concerns have been raised they might facilitate stalking, for example.
South Africa’s Small Business Development Agency has fallen victim to ransomware attackers, who have crippled its systems, according to a source with knowledge of the situation.
US President Joe Biden has ordered the creation of an air accident-style cyber review board and the imposition of new software standards for government agencies following a spate of digital intrusions.