The many ways you can be scammed on Facebook, part II
Not everything on Facebook is a scam, thankfully, but there are some nasty ones that could potentially ruin the Yuletide season for you. Here are some tips on keeping safe.
Spotify resets some user logins after hacker database found floating online
The 380 million record database. didn’t belong to Spotify itself, but instead to fraudsters who’d uploaded it.
RegTech explained: a crucial toolset for the financial industry
The financial industry has come to rely on RegTech. It helps financials comply with regulations and tightens up data safety and security. But what is it exactly?
Facial recognition: tech giants take a step back
Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law.
Child identity theft, part 1: On familiar fraud
In this two-part series on child identity theft, we shed light on the growing problem of familiar fraud, where those entrusted with a minor’s information are the very ones who abuse it.
How to protect yourself from doxing
Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it.
What role does data destruction play in cybersecurity?
Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.
How to securely send your personal information
On its own, email is not safe for sending credit card or passport numbers. Here’s how to securely send personal information over the Internet.
The top six takeaways for corporate data privacy compliance
Here are Labs’ top six takeaways from our data privacy and cybersecurity law series on corporate data privacy compliance. From emerging startups to burgeoning enterprises, these rules help not just with legal liability, but also user trust.
What is personal information? Or personally identifiable information? In legal terms, it depends
What exactly is the “personal information” that companies need to legally protect? Learn which data points organizations need to secure, from Social Security numbers to olfactory, smell-based data (!), to comply with the law.