AirDrop flaws could leak phone numbers, email addresses
You can only stay safe by disabling AirDrop discovery in the system settings of your Apple device, a study says
Education M.A. in translation and interpreting.
Highlights of your career Working as a copywriter and freelancing as a translator while thinking in the correct language.
Position and history at ESET Joined in the fall of 2019 as security writer.
What malware do you hate the most? Adware, annoying the living daylight out of me since forever.
Favorite activities Drinking coffee while reading a book, exploring new places, trying new things..
Golden rule for cyberspace Don’t trust and always verify, always use a Gandalf level adblocker.
When did you get your first computer and what kind was it? A Pentium 3 powered pc with a GeForce card lacking a pixel shader, around the year 2000 so dial up modems were still a thing.
Favorite computer game/activity Assassin’s Creed or God of War spinning myths and history in fun alternative ways.
You can only stay safe by disabling AirDrop discovery in the system settings of your Apple device, a study says
Amer OwaidaThe update patches a total of seven security flaws in the desktop versions of the popular web browser
Amer OwaidaThe malware sends automated replies to messages on WhatsApp and other major chat apps
Amer OwaidaThe 30-day grace period is designed to speed up the rollout and adoption of patches
Amer OwaidaHere are some quick and easy tips to help you clean up your cyber-clutter and keep your digital footprint tidy
Amer OwaidaOther common and easily hackable password choices include the names of relatives and sports teams, a UK study reveals
Amer OwaidaAuthorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities
Amer OwaidaAn attacker can lock you out of the app using just your phone number and without requiring any action on your part
Amer OwaidaReports of another trove of scraped user data add to the recent woes of popular social media platforms
Amer OwaidaThe treasure trove of data reportedly includes users’ LinkedIn IDs, full names, email addresses, phone numbers and workplace information
Amer OwaidaEasy to redeem and hard to trace, gift cards remain a hot commodity in the criminal underground
Amer OwaidaFrom losing cherished memories to missing deadlines, the impact of not having backups when a data disaster strikes can hardly be overstated
Amer OwaidaHad the incident gone unnoticed, the attackers could have taken over websites using the tainted code
Amer OwaidaThe bug is under active exploitation by unknown attackers and affects a wide range of devices, including iPhones, iPads and Apple Watches
Amer OwaidaMoney doesn’t buy you happiness – cryptocurrency doesn’t buy you a genuine COVID-19 vaccine
Amer OwaidaThe company was left to deal with three months’ worth of IT problems
Amer OwaidaNearly half of reported cybercrime losses in 2020 were the result of BEC fraud, according to an FBI report
Amer OwaidaWhy do many organizations have a hard time keeping up with the evolving threat landscape and effectively managing their cyber-risks?
Amer OwaidaFollow these easy steps to prevent your Twitter account from being hacked and to remain safe while tweeting
Amer OwaidaThe Bureau received over 28,000 reports of COVID-19-themed scams last year
Amer Owaida