How to set up security and privacy in Strava
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
54 articles
Want to keep your runs, rides, and hikes private on Strava? This guide will walk you through the essential privacy settings in this popular fitness app.
Running apps know a lot about their users, so it’s worth setting them up to ensure your data doesn’t fall into the wrong hands. Here’s how.
What security aspects should be top-of-mind when implementing important changes in corporate IT infrastructure?
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
A method of stealing data from an air-gapped system through a speaker you may not even know is there.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Computers don’t necessarily need a Wi-Fi module to transmit information over Wi-Fi, Israeli researchers have found.
Our experts uncovered a scheme to extract cardholder data using Google tools.
If you don’t want to pay for extra gigabytes in iCloud, try these other ways to backup your photos and other iPhone files.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
In this episode, Dave and Jeff plus some special guests talk travel and keeping your data safe.
Employees going away for the winter break? We explain what to do to keep trips from turning into corporate data leaks.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
On this podcast, special guest David Emm joins David to talk data privacy, AI, and smart homes
How to safeguard your solution and clients with time-tested technologies.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
Do you use NAS for backup? We’ll tell you how to protect it from new threats
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
Our security experts zeroed in on the state of targeted attacks in APAC countries from past to present and how governments, businesses, and concerned industrial sectors can beef up their cyber defenses at 2017 APAC Cyber Security Weekend in Phuket.