How NFC Optimizes Enterprise Asset Management
The quality of a company’s asset management is a critical factor in evaluating its overall performance. By incorporating NFC technology, companies not only improve their operations but they also...
View ArticleHUPS – Tiedot vuotivat nettiin
Viime aikoina olemme saaneet lukea Helsingin kaupungin tietomurrosta. Helsingin Sanomissa WithSecuren tutkimusjohtaja Mikko Hyppönen arveli, että Helsingin kaupunki olisi valikoitunut sattumalta...
View ArticlePhishing Scams: Redundant and Predictable but Still Trendy – How to Stay Safe
Every time a major phishing attack hits the headlines, news outlets make it sound so surprising and unprecedented. But for those of us working closely with data security and IT, the storyline falls...
View ArticleHow is Passwordless more secure?
When using a password to authenticate yourself for a service, you are relying on two main components: A username which is normally public, and its password. In theory, your password is a secret, but in...
View ArticleThe “10 Things to Know About Me” on your stories might be a security risk.
These recurring trends might seem harmless at first; I mean what could possibly go wrong with oversharing personal details with friends, followers and third parties. These posts reveal more personal...
View ArticleWatch Out, Scammers Love the Summer Holidays
Oh, summertime! The time we get to the beach, and cybercriminals get to business. “Don’t click suspicious links”, “Don’t share your personal info online” are basics most of us have learned by now....
View ArticleWatch Out, Scammers Love the Summer Holidays
Oh, summertime! The time we get to the beach, and cybercriminals get to business. “Don’t click suspicious links”, “Don’t share your personal info online” are basics most of us have learned by now....
View ArticleMifare technology and its security problems on display again
(suomeksi alla) This week, a security investigation by the French research lab Quarkslab revealed significant implementation flaws in Mifare-type RFID chips. These vulnerabilities enable attackers to...
View ArticleIs My Fridge Conspiring Against Me?
We all get a little paranoid about our gadgets occasionally. The “Is my phone listening to me?” entry has over a billion search results on Google alone. While your smart fridge isn’t plotting a grand...
View ArticleGen Z’s Dilemma: Privacy VS Convenience
As the first true digital natives, Gen Z has grown up completely immersed in technology. While their tech-savviness is undeniable, their relationship with cybersecurity and personal data privacy is...
View Article