What is Software Piracy?
It is the unauthorised copying and distribution of software without ownership and legal rights. Another form of software piracy is when you download a program illegally. Examples of software piracy include:
A trojan is a type of malicious software (malware) that appears to be something useful or safe, but in reality, it is performing background tasks such as giving access to your computer or sending personal information to other computers. Trojan horses are one of the most common methods a hacker uses to infect computers and collect personal information from the machine.
Most employees get work done through desktop computers, which is why security for desktop computers is so important. If an unauthorized person gains access into your work computer, your organization’s confidential information will be at risk.
Your online reputation is the way people perceive you based on what you say or do online. Everything that you post online, and everything that others post about you contributes to your online reputation.
There are a growing number of location-based apps available for smartphone and other devices, making it easy to show your friends and family where you are and what you’re doing. Smartphones have a built-in feature which uses GPS and cell tower locations to pinpoint your approximate location. This allows you to post your location online through social networking sites or apps and is also used by location-based services such as maps. The location data can also be embedded in photos you take on your smartphone.
Many airports, hotels and internet cafes around the world provide internet access through public kiosks or computers. This is convenient for those who are unable to have internet access while abroad, but you should also be mindful of the security risks.
What are the risks of using public internet kiosks?