“Don’t worry, I’m in control”, but no… For the second consecutive year, one more summer we bring you a special issue with the best security articles published on the pages of Computer Hoy during the last 12 months. In the first edition, a year ago, on this very page I appealed to the Risk Compensation Theory to explain how overconfidence leads us not to take the necessary precautionary measures in dangerous scenarios. As I mentioned, the theory is currently known as the Peltzman effect and states that the lower the perceived risk in a given situation, the fewer precautionary measures we take. Or, put another way, we have more or less risky behaviors depending on whether we feel more or less protected. And then come the scares.
We compensate for the security measures imposed by taking more daring behavior than normal. The problem is that this feeling can be just a mere illusion. Remember, cognitive biases feed on our ignorance about them: just because we don’t perceive risk or feel safe doesn’t mean it doesn’t exist. In this sense, the National Institute of Cybersecurity (INCIBE) together with the National Observatory of Technology and Society (ONTSI) published a few months ago the dossier ‘How citizens are protected against cyber risks’, a study on the perception and level of Confidence in Spain in computer security.
Among other figures and conclusions that are worth analyzing, it highlights that the majority of PC users use security measures, although many are not aware of it (29.7% declare they do not use firewalls, when their devices reflect that 96 .6% use it). In contrast, they believe they are adopting privacy measures, but reality denies this. In the home, PCs tend to be thought of as more secure than they are, while mobile phones are perceived as more vulnerable than they have been shown to be. Just one more fact: 56% of users who consider themselves cybersecurity prepared have their computers infected. The risk is real.
Discover in video the main themes of this issue
All About Security: Russian Spies
Potential dangers are not always very obvious. Security experts sound the alarm: are there Russian spies on our mobile phones?
All about security: Mobile censorship?
Where politics and technology meet: an EU country warns against buying Chinese phones.
All about security: Cookie Law
A new European law wants to change the daily use of cookie notices. However, it seems that the revolution will still have to wait.
All about security: With feet of lead…
Unfortunately, deception and lies are part of everyday life on the Internet. The following cases are a matter of concern for our readers.
All about security: Biometric bank card
This innovative card integrates a biometric sensor and offers users greater security and convenience in payments. This latest generation of cards also represents a key milestone.
All about security: Your credit card is in danger
Almost 40% of Spaniards store their bank details on their devices. Is there a safe way to do it?
All about security: 7 Tricks for safe online purchases
When buying on the Internet, we can find many hidden dangers and pitfalls. Computer Hoy explains how to purchase products safely.
All about security: What if the video lies?
We can no longer trust what our eyes see: this is demonstrated by an experiment by the students of the FreeTech Academy.
All About Safety: I Know What You’re Doing!
When jealousy is a problem: Hundreds of thousands of victims are monitored by spy apps.
Your digital life safe: Security programs
With our selection of programs, you will get more security for your PC and mobile: they will protect you from malware, from hacker attacks and will ensure your privacy.
Practical: Insurance for your data
Whether it’s unforgettable memories, important documents, or even sensitive data, your hard drive is sure to be full of files you wouldn’t want to lose. In this article we present three programs with which both you and your data will be safe.
Tricks for Microsoft Authenticator
The Microsoft Authenticator app helps you protect your accounts online. Read here how it works.
Security and privacy: Tricks to create a password
The password is the key to access our data, so it is very important to create a system that allows you to use secure passwords, but that are easy to remember.
16 VPN Services: Anonymous and Unlimited
Do you want to get rid of surveillance and control on the Internet? At Computer Today we have put 16 VPN services to the test.
The best antivirus: The great security test
Measures against viruses are more important than ever. But which program offers the best protection? From Computer Today we check it for you.
Bluetooth Locators: Smart Hounds
Do you need to find the keys between the sofa cushions or the lost backpack? Locators can help you with that… but how about the ones from Samsung, Apple and the others?
Technology for everyone: Prove that you are you
Proving identity on the Internet is vital to be able to carry out official procedures. The problem is that there are several different methods, all of them quite confusing. We will try to explain them.
Technology for All: Digital Autobiography
With the data recorded by our mobile phones, it is possible to create a history of everything we do throughout the day. Thus, there are many benefits, but also the risks.
in the next number
Advance Computer Today 624.
George is Digismak’s reported cum editor with 13 years of experience in Journalism