FOR IMMEDIATE RELEASE Pori, Finland – November 25, 2024 – Spear Innovations Oy Ltd, a leading provider of high-assurance identity solutions in the Nordics, announces a strategic partnership with Sentry Enterprises, a pioneer in decentralized identity…
Read More
Gen Z’s Dilemma: Privacy VS Convenience
As the first true digital natives, Gen Z has grown up completely immersed in technology. While their tech-savviness is undeniable, their relationship with cybersecurity and personal data privacy is more nuanced. This generation often walks…
Read More
Is My Fridge Conspiring Against Me?
We all get a little paranoid about our gadgets occasionally. The “Is my phone listening to me?” entry has over a billion search results on Google alone. While your smart fridge isn’t plotting a grand…
Read More
Mifare technology and its security problems on display again
(suomeksi alla) This week, a research paper by Quarkslab revealed significant implementation flaws in native Mifare-type RFID chips. These vulnerabilities enable attackers to access the native Mifare chips’ secret keys, which can then be used…
Read More
It’s Not a Cookie, It’s a Privacy Concern:
Cookies are an omnipresent part of our online experience. Almost every time you open a website, you’re met with the “Do you accept cookies?” banner. Most of these banners intentionally downplay the complexity of the…
Read More
Watch Out, Scammers Love the Summer Holidays
Oh, summertime! The time we get to the beach, and cybercriminals get to business. “Don’t click suspicious links”, “Don’t share your personal info online” are basics most of us have learned by now. Cyber-scammers, however,…
Read More
The “10 Things to Know About Me” on your stories might be a security risk.
These recurring trends might seem harmless at first; I mean what could possibly go wrong with oversharing personal details with friends, followers and third parties. These posts reveal more personal details than you would normally…
Read More
How is Passwordless more secure?
When using a password to authenticate yourself for a service, you are relying on two main components: a username which is normally public, and its password. In theory, your password is a secret, but in…
Read More
Phishing Scams: Redundant and Predictable but Still Trendy – How to Stay Safe
(suomeksi alla) Every time a major phishing attack hits the headlines, news outlets make it sound so surprising and unprecedented. But for those of us working closely with data security and IT, the storyline falls…
Read More
How NFC Optimizes Enterprise Asset Management
The quality of a company’s asset management is a critical factor in evaluating its overall performance. By incorporating NFC technology, companies not only improve their operations but they also enhance asset tracking, streamline maintenance processes,…
Read More