
Sergey Soldatov
Articles
-
Nov 5, 2024 |
kaspersky.com | Alanna Titterington |Alexander Marmalidi |Stan Kaminsky |Sergey Soldatov
We’ve already discussed how most tracking apps provide minimal protection for your personal data by default. Routes and workout times, your fitness data and photos from your runs are usually publicly available online unless you explicitly block them. The consequences, as we’ve written, can be disastrous — ranging from leaks of secret facility locations to stalking and even attempted murder. To avoid this, you need to configure both your smartphone in general and running apps in particular.
-
Oct 24, 2024 |
kaspersky.com | Alanna Titterington |Alexey Sadylko |Sergey Soldatov
As we’ve discussed before, one does not simply install a fitness tracking app and start using it straight away without first configuring the privacy settings both on the phone and in the app itself. With default settings, these apps often share full details of your workouts with the entire internet, including your precise location. And criminals and fraudsters can use this data for their nefarious purposes.
-
Oct 23, 2024 |
kaspersky.com | Alexey Sadylko |Sergey Soldatov |Alanna Titterington
“Please upload a selfie with your ID to verify your identity” — such requests are becoming increasingly common for various online services. Banks, car rental services, even potential employers or landlords may ask for such photos. Whether you should share your confidential data in this way or not is a personal decision. We’ve laid out all the pros and cons, and prepared tips on how to protect yourself if you do need to take such a selfie. Should you take a selfie with your documents?
-
Oct 22, 2024 |
kaspersky.com | Sergey Soldatov
There are various ways artificial intelligence can be used in cybersecurity – from threat detection to simplifying incident reporting. However, the most effective uses are those that significantly reduce human workload without requiring large, ongoing investments to keep the machine learning models up to date and performing well.
-
Oct 22, 2024 |
kaspersky.co.uk | Sergey Soldatov |Alanna Titterington
There are various ways artificial intelligence can be used in cybersecurity – from threat detection to simplifying incident reporting. However, the most effective uses are those that significantly reduce human workload without requiring large, ongoing investments to keep the machine learning models up to date and performing well.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →