Posts

Can my phone be hacked while charging? | Juice Jacking

Charging smartphones at public USB charging stations in places like airports, hotels or the mall may leave travelers at risk for juice jacking. Juice Jacking Many of us are so attached to our smartphones, it seems at times like they […]

Read more...

Find real love online – How to spot a Catfish

Dating in the digital age opens up seemingly endless possibilities for finding romance. With Valentine’s Day around the corner – it’s important to remember that dating apps can be misused for digital deception. Using a dating app to find your […]

Read more...

How to use Facebook’s updated Privacy Checkup tool

What is Facebook’s Privacy Checkup? Facebook’s Privacy Checkup tool is meant to help make it easier for users to understand their current privacy and security settings. This includes helping users to see which information is being shared on their profile, […]

Read more...
digitale privatsphäre

5 Things You Can Do to Protect your Digital Privacy

In a world where much of our lives are spent online, keeping your personal data secure is paramount. Hackers and cyber criminals can use personal information found online to gain access into your accounts. Luckily, there are lots of easy […]

Read more...

A Consumer’s Guide to the California Consumer Privacy Act

The California Consumer Privacy Act (CCPA) is a new privacy law aimed at protecting California consumers by establishing new privacy rights. The CCPA, also known as AB 375, was put into effect on January 1, 2020. In a press release […]

Read more...
surveillance capitalism

The Age of Surveillance Capitalism has Begun.

If you’ve not heard of Shoshana Zuboff, social psychologist and also a former professor at Harvard Business School, then chances are that you may not be very familiar with this term. The term “Surveillance Capitalism“, which has now grown in […]

Read more...
What is IOT and how does it Work

What is IOT and how does it Work

“The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer […]

Read more...
Webcam Malware

Webcam Malware

Webcams are versatile and convenient. They allow us to stay connected to friends and family, make video conferences with our colleagues and much much more. But like all good things in life, there is a dark side too. One of […]

Read more...
Cybersecurity Spending

Cybersecurity Spending

In the past few years, we are witnessing an explosion of data breach cases, cybersecurity and ransomware attacks on small, medium-sized and even big companies. It is very unlikely there will be a downward trend in cybersecurity cases in the […]

Read more...
How Do I Make My Netflix Profile Private

How Do I Make My Netflix Profile Private?

Hey! Netflix is just an entertainment platform so why will I want to make my Netflix profile private? We live in a time when practically everything we do that requires an internet connection or data transfer of any kind requires […]

Read more...
How To Remove Personal Information From The Internet

How To Remove Personal Information From The Internet

  Without any doubt, the internet has brought us many good things. Fast, easy and accessible communications, it has changed the way we travel, entertain ourselves, and even cook. However, one distinct disadvantage is the huge amount of data and […]

Read more...
iOS 13 Privacy and Security Features You Should Know

iOS 13 Privacy and Security Features You Should Know

With security and privacy taking center stage in the world of information technology, one of the most important factors anyone should consider when purchasing a mobile device or any kind of IT equipment that offers features with regards to ensuring […]

Read more...
Scroll to Top