Information about potential threats to your personal and financial security covering desktops, laptops, and mobile devices.
The recent flourishing of artificial intelligence (AI) tools and chatbots can mean different things to different people. Some use them as learning tools, asking questions about scientific and historical topics. Others give instructions to write lyrics or make up stories. Still more use them to write papers. But a student plagiarizing a paper is harmless […]
Artificial intelligence (AI) is certainly nothing new. Computers’ ability to mimic human thought and learn from experience is a science that’s been around practically since the dawn of computing. Of course, AI has come a long way since its inception. Whether you embrace, resist or even fear it, AI is a natural part of everyone’s […]
Social media had humble beginnings as a way to connect and share news with friends and family. Now, it’s a hub of information, entertainment and even commerce. Various platforms have become so popular over the last decade or two that almost 5 billion people use some form of social media, according to Smart Insights. That’s […]
As recent years have been largely characterized by rapid technological increase, the capacity of cybercriminals has also shown no sign of slowing down. Rather, cybercrime is a threat that reaches into the trillions of dollars annually, predicted to be of a $10.5 trillion dollar consequence by 2025. With new avenues being exploited and old methodologies […]
Airports, buses, and other places may have public USB ports you can use to charge your devices. But it’s best to avoid them unless you really need to recharge. Public charging ports could be used to spy on you or infect your device with malware. Here are some tips for staying safe when charging your […]
From banking to messages, your mobile device contains a plethora of important — oftentimes sensitive — information, making it a target for cybercriminals. These criminals will leverage gaps in mobile security to gain unauthorized access, resulting in both professional and personal consequences. Fortunately, there are steps you can take to fortify your mobile devices, such […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.