
Ring Doorbell: Invasion of Privacy?
What! Doorbell an invasion of privacy? Whose privacy exactly? With the constantly escalating privacy wars going on today, the attention of the world has been drawn to the potential privacy issue th...

Webcams are versatile and convenient. They allow us to stay connected to friends and family, make video conferences with our colleagues and much much more. But like all good things in life, there i...

A Consumer's Guide to the California Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA) is a new privacy law aimed at protecting California consumers by establishing new privacy rights. The CCPA, also known as AB 375, was put into effect on J...

In the past few years, we are witnessing an explosion of data breach cases, cybersecurity and ransomware attacks on small, medium-sized and even big companies. It is very unlikely there will be a d...

How to increase my Android privacy?
Our focus in this article is android privacy since android users are rightfully skeptical about the privacy of their devices. Given that the number of people who use at least one Android device aro...

How To Keep Your Passport Safe?
In many countries, the passport not only serves as a travel document but also a proof of citizenship, identity, age, and address. Applying for a new passport can be a tedious and expensive process ...

How To Remove Personal Information From The Internet
Without any doubt, the internet has brought us many good things. Fast, easy and accessible communications, it has changed the way we travel, entertain ourselves, and even cook. However, one distinc...

Addressing Privacy Concerns of Smart Home Devices
Privacy! How much does it mean to us? We all love the idea of walking into our homes and conveniently using our voices to control the lights, temperature, turn on the television, make a phone call,...

Cybercrime - How Hackers Can Take Control of Your Webcam
While this post is not about teaching anyone the arts of cybercrime, it is likely that some of us may have been wondering how on earth someone can remotely take control of our laptop’s camera to be...

Preventing RFID Skimming - A Simple but Effective Approach
In a previous article we attempted to highlight the risks and process of RFID skimming. In that brief post, we simply identified some of the obvious risks without really proffering any solution. To...

Understanding the Role of VPNs in Security and Privacy
Security and privacy are big issues in our world today. This is largely because the world is moving steadily and surely into a full blown digital age where almost everything is done across digital ...

RFID Skimming - Understanding the Threats and Process
RFID skimming is something that many regular folks may not fully understand despite that fact that they are likely the worse hit. As the world continues its march toward a complete dependence on te...

Introduction about how does a RFID card work Smart Cards have found many applications not only in the finance and payments industry but also in identity management, access control, logistics, healt...

How to Set Your Facebook Account to Private
We all have loads of fun on Facebook. People love to share every single detail about their lives and those of their families. We just bought a new car! We are vacationing in the Bahamas and other i...

Cyber Security – Child Tracking Watch Found to be Easy to Hack
Cyber security has not always been something that parents had to worry about. Parents have always been worried about where their child is and who the child is with. This concern has led many parent...

Is "The Great Hack" a True Story?
A lot of people ask if “The Great Hack” is based on a true story. Have you seen the Netflix movie or documentary “The Great Hack”? If you haven’t, then you should really try to or at least you can ...

Phone Camera Spying Threats You Should be Aware of
We all pick up our phones and we boast about the quality of the front and back cameras. We take selfies and videos anywhere and everywhere. It really is fun. However, are you aware of the reality o...

Black Mirror Webcam Hack Episode - Today's Reality
If you watched the ‘Black Mirror’ webcam hack episode, titled “Shut Up and Dance” and the whole scenes that played out on your screen seemed too far-fetched, then you need a very serious reality ch...

Article 13 and Its Implication for Internet Privacy
Since the EU passed the highly controversial Article 13, a lot of concerns have been raised. Discussions aimed at addressing its likely effect on the internet and its users have been rampant. Most ...

Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers, smart...

A Simple Laptop Webcam Cover Can Increase Your Privacy
Do you know what a webcam cover is? If you do not know what it is and what it does, do not feel bad because you are not alone in this. When as far back as 2012 a company carried out a study to find...
Laptop Camera Cover: Camera Sticker or Webcam Cover?
How to cover your camera on your laptop? Is webcam hacking a thing of the past, or does it become more relevant than ever? Many people have been asking this question to themselves and to be sure, t...

Using a Macbook Pro Webcam Cover for Improved Privacy Protection
There was a time when Mac was regarded by most average users as almost hacker proof. Such users will not readily see the need to get a Macbook Pro webcam cover. Well, if you are one of those, you m...

Cyber Security – Major Predictions Ahead of 2021
As 2020 ends and the new year looms, we sadly cannot say that the cybersecurity issues of this year have been put behind us. If the predictions flying around are anything to go by, then we may be i...