Real Guide: How to Prevent Spyware

The name “spyware” may paint a picture of something straight out of a James Bond movie, used by intelligence officers…

What’s the Difference: Anonymity vs. Pseudonymity

Think about all of your accounts, files, emails, websites you visit, and so on, and ask yourself: Which of these…

What’s Wrong with Amazon Echo Privacy?

Intelligent speaker systems can make everyday life more comfortable, but they also create privacy problems. Recently, an Amazon Echo smart…

WhatsApp Moderators Can View Users’ Private Messages

WhatsApp has the hidden ability to read user messages – the company uses this system to handle complaints. In fact,…

2FA or U2F: What Should You Use to Protect Yourself?

Unfortunately, SMS is not the best choice for confirming two-factor authentication. It can be easily viewed on the phone’s lock…

6 Account Types That Cannot Be Abandoned

You probably never thought that leaving behind old accounts in social networks could lead to serious consequences, but you would…

We have had backdoors in our smartphones for 20 years

Sometimes one gets the impression that the principal security threat to citizens comes from the state secret services. They are…

Data Is the New Gas

Every step we take leaves a digital footprint: when we google the meaning of a new meme, buy coffee at…

Hong Kong’s Data Protection Law

In recent years, a series of high-profile data breaches in China has intensified public calls for the government to adopt…

Telegram Bots for Personal Data Searching

With the advent of Telegram, the lives of many internet users have really become easier. More precisely, this happened after…

Show morerotate