5 Reasons Why Background Checks are Crucial for Recruitment

Background checks have become an essential part of the hiring process. As a member of the recruitment team, it is your job to make intelligent and effective hiring decisions that will ensure the best possible outcome for the company. Hiring someone based on a cursory evaluation can sometimes lead to serious problems down the line, […]
Parents warned over ‘crafty’ WhatsApp scam that starts ‘hey mum, it’s me’

There has been a lot of different scams hitting WhatsApp users over the past year, with recent attempts by fraudsters to extort money from users becoming even more convincing, according to a recent article published in the Dublins Q102. WhatsApp users are being warned of a new scam emerging in recent days where mothers are […]
Are Apple AirTags Being Used to Track People and Steal Cars?

On a Sunday night in September, Ashley Estrada was at a friend’s home in Los Angeles when she received a strange notification on her iPhone: “AirTag Detected Near You.” An AirTag is a 1.26-inch disc with location-tracking capabilities that Apple started selling earlier this year as a way “to keep track of your stuff.” Ms. Estrada, 24, […]
What is ‘simjacking’? Here’s how the mobile phone sim card scam works

SIM hijacking, or ‘SIM-jacking’, is a dangerous new way that fraudsters can steal from people by secretly taking control of their phones, according to an article published in Inews.Co.Uk In a growing trend, thieves are exploiting the ability of mobile service providers to ‘port’ a phone number between different SIM cards. Normally this is a […]
How to spot the software that could be spying on you

Testimonial from *Maria *, victim of cyber-stalking ( source: BBC) When she met her husband in her early twenties, it felt like love. But romance quickly soured, turning in to a 25-year tale of abuse and control. First there was the name-calling. Then, complete control of her finances, her movements, and eventually over their three […]
Cybertheft protection: Why you might want to wrap your car key fob in foil

Given that the best way to store your car keys at night is by putting them in a coffee can, what’s an ex-FBI agent’s advice to protect cars from theft during the day? Wrap car fobs in aluminum foil.The original article has been published recently in SC Times. “Although it’s not ideal, it is the most inexpensive way,” said Holly […]
Beware of unknown QR codes—they could contain malware

Thanks to the pandemic, QR codes have popped up on ad posters, restaurant tables, and billboards around the world, inviting people to scan them in order to view menus and marketing information without having to type a web address into their phones, according to a recent article published in the Fast Company website. But clicking […]
PART 2: Meta will continue to use facial recognition technology, actually

Earlier this week, Facebook made the somewhat shocking announcement that it would be shutting down its facial recognition systems. But now, Facebook’s parent company, Meta, has walked that promise back a bit. A lot, really, according to a recent article published in Input Mag online. Meta is not planning to hold back its use of […]
Facebook is shutting down its facial recognition software

Facebook said Tuesday it plans to stop using facial-recognition software that could automatically recognize people in photos and videos posted on the social network, marking a massive shift both for the tech industry and for a company known for collecting vast amounts of data about its billions of users. Facebook, which changed its company name to […]
Leaked Facebook document reveals blacklist of dangerous organizations, individuals

Facebook’s blacklist of dangerous individuals and organizations has been leaked to the public according to a recent article published in Fox Business @ A reproduced snapshot, published by The Intercept on Tuesday, features 100 pages of more than 4,000 groups and individuals that the social media giant classifies under “terror,” “hate,” “crime,” “militarized social movement” or “violent non-state […]