Open in app

Sign in

Write

Sign in

Mastodon
Erich Schmidt
Erich Schmidt

2 Followers

Home

About

Aug 8

A Win for Privacy

Google has announced a new policy that will compel Android app developers to allow users to delete their accounts directly from the app. This decision is part of Google’s commitment to enhancing user control over personal information and account management. Starting November 2023, all Android apps available on the Google…

Privacy

1 min read

Privacy

1 min read


Aug 8

The Importance of Protecting Your Email from Spam and Phishing Attempts

In today’s digital world, email has become a vital tool for communication, both in personal and professional settings. It enables us to share valuable information, stay connected with friends and colleagues, and manage various aspects of our lives. However, with the increasing reliance on email comes a higher risk of…

Cybersecurity

3 min read

Cybersecurity

3 min read


Aug 8

Dodging the AI Voice Scam

I’ve been worried about this for years and knew it was just around the corner; here we are! If we didn’t have enough to worry about, now we need to be on the lookout for AI-generated voice scams. From crafty con artists to high-tech trickery, no one’s vocal cords are…

Scam

1 min read

Scam

1 min read


Aug 8

It listens, and gossips.

Once upon a time, a crafty little thing called the PC speaker lived in a land full of ones and zeros. You may remember it from the good ol’ days when computers were as big as your living room, and it’d go “beep beep” to announce its presence. Well, guess…

Security

2 min read

Security

2 min read


Aug 8

OSINT in Executive Protection

OSINT is a powerful skill to learn for the EP agent. In our increasingly interconnected world, executive protection (EP) agents must use all the available tools to protect their clients. One of these tools is open-source intelligence (OSINT). OSINT is the collection and analysis of publicly accessible information. …

Osint

2 min read

Osint

2 min read


Aug 8

Make Two-Factor Authentication (2FA) Part of Your Routine

Two-factor authentication (2FA) is an important security feature that can help protect your digital accounts from malicious actors. It requires users to prove their identity with two independent pieces of evidence: something you know, like a password, and something you have, like a physical token or a smartphone. Turning on 2FA for your online accounts makes it more difficult for hackers to gain access to your sensitive data.

Cybersecurity

1 min read

Cybersecurity

1 min read


Aug 8

Ransomware: The Digital Kidnap

Ransomware is digital kidnapping, and leaves a devastating impact on its victims. Ransomware is a dangerous cyber threat. Criminals use ransomware to extort money from victims by locking their data for payment. In this digital kidnapping, data is held hostage instead of a person. …

Ransomware

2 min read

Ransomware

2 min read


Aug 8

The Debt of Silence: Human Trafficking

Human trafficking is lurking in your community, and it’s not being addressed. Slavery, a crime against humanity, and a serious violation of basic human rights. Human trafficking is the trade of people for exploitation, including but not limited to sexual servitude, prostitution, and forced labor. …

Human Trafficking

2 min read

Human Trafficking

2 min read


Aug 8

Holiday Security

The holiday season is a time for family and friends to travel, gather, and celebrate. But, the holidays can also be a time of increased risk for your personal and home security. Days grow shorter, the nights longer, and criminals know ’tis the season for home invasion. You can take…

Security

4 min read

Security

4 min read


Aug 8

Written by a Robot

As Artificial Intelligence (AI) continues to evolve, so is its application in the online world. From virtual customer service reps to automated content curation, AI is increasingly used to create and manage online content. Moreover, AI is beginning to show its potential as a powerful tool for creating original content…

AI

1 min read

AI

1 min read

Erich Schmidt

Erich Schmidt

2 Followers

Security Professional & Technologist

Following
  • The PyCoach

    The PyCoach

  • Userpilot Team

    Userpilot Team

  • Cyber Sam

    Cyber Sam

  • Paul Rose

    Paul Rose

  • Frost

    Frost

See all (38)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams