2 facts

Image by rawpixel.com on Freepik

In trying to simplify our daily interactions with technology we give control to companies to manage security on our behalf. One way big tech has tried to protect us is through 2 factor authentication, to prove we are who we say we are, but is it working and do we get a choice?

Hearty hacking

Hearty hacking 1

The hacking of any social media account has ramifications far beyond that one platform or that one individual. An individual may be the initial target to gain access to far reaching information, data or resources, privately or publicly. It can dismantle capability of a website or it can disrupt the power supply to a rural village.

Phone phishing

Phone phishing 2

Phishing texts are requesting the same information from a phone user that they asked for on email. The difference is that if you click on a suspect link on your phone it can download a screening tool that extracts private information direct from your phone, including your whereabouts via GPS and other forms of identity theft. Phishing is a serious crime that often comes with financial and safety implications for the unsuspecting, fooled victim.