Biometrics and You: What You Need to Know to Protect Your Data

Many of us use fingerprints or facial recognition in our everyday lives, whether it’s to unlock our phones, authorize banking transactions, access secure areas at our workplace, or when going through customs at the airport.  The convenience is real, but so are the...

IoT Attack Surface: Where are the Weak Links?

IoT households are generally deemed more exposed to digital threats due to the large number of internet-connected devices, but some devices are more prone to attacks than others. Internet devices used as entry points in cyber attacks It’s no longer a secret that...