Working from a hotel? Beware the dangers of public Wi‑Fi
As more and more hotels are turning rooms into offices, the FBI is warning remote workers of cyber-threats lurking in the shadows
Education M.A. in translation and interpreting.
Highlights of your career Working as a copywriter and freelancing as a translator while thinking in the correct language.
Position and history at ESET Joined in the fall of 2019 as security writer.
What malware do you hate the most? Adware, annoying the living daylight out of me since forever.
Favorite activities Drinking coffee while reading a book, exploring new places, trying new things..
Golden rule for cyberspace Don’t trust and always verify, always use a Gandalf level adblocker.
When did you get your first computer and what kind was it? A Pentium 3 powered pc with a GeForce card lacking a pixel shader, around the year 2000 so dial up modems were still a thing.
Favorite computer game/activity Assassin’s Creed or God of War spinning myths and history in fun alternative ways.
As more and more hotels are turning rooms into offices, the FBI is warning remote workers of cyber-threats lurking in the shadows
Amer OwaidaCompanies facilitating ransomware payments run the risk of facing stern penalties for violating US regulations
Amer OwaidaAs we steadily adopt smart devices into our lives, we shouldn’t forget about keeping them secured and our data protected
Amer OwaidaA month teaching us that when everyone pitches in and does their part, then almost everyone is protected
Amer OwaidaMicrosoft resolves a service disruption that affected Office 365, Outlook.com, Teams and other cloud-based services
Amer OwaidaThreat actors may spread false claims about compromised voting systems in order to undermine confidence in the electoral process
Amer OwaidaAs cloud storage solutions are becoming more and more popular, we look at several simple steps you can take to secure your files on Google Drive
Amer OwaidaThere is no evidence that cybercriminals were also able to steal customer data
Amer OwaidaThe sting is said to be the US Government’s largest operation targeting crime in the internet’s seedy underbelly
Amer OwaidaNIST’s tool can help organizations improve the testing of their employees’ phish-spotting prowess
Amer OwaidaAttackers could have exploited the flaw to steal victims’ login credentials or install malware on their devices
Amer OwaidaWhat are some common strategies cybercriminals employ in extortion schemes and how can you mitigate the chances of falling victim to a cyber-shakedown?
Amer OwaidaWhile wanting to return a found USB flash drive is commendable, you should avoid taking unnecessary risks, lest your device get infested and your data compromised
Amer OwaidaZoom now supports phone calls, text messages and authentication apps as forms of two-factor authentication
Amer OwaidaOregon’s largest city aims to be a trailblazer when it comes to facial recognition legislation
Amer OwaidaThe cyber-incident takes most of the university’s systems offline and officials estimate that the institution will take weeks to recover
Amer OwaidaWith TikTok being all the rage especially with teens, we look at a feature that gives parents greater control over how their children interact with the app
Amer OwaidaAs the US presidential election nears, the company’s new tech should also help assure people that an image or video is authentic
Amer OwaidaUnknown threat actors were able to exfiltrate information from the email accounts of several parliamentarians
Amer OwaidaThe vulnerability could allow criminals to rack up fraudulent charges on the cards without needing to know the PINs
Amer Owaida