Our latest news

News

Get access to our latest news by signing up for our newsletter.

How to promote privacy awareness at your company

How to promote privacy awareness at your company

In the digital age we live in, privacy awareness has become increasingly relevant. Especially when a lack of privacy awareness can lead to vulnerabilities that may leave personal data or sensitive ...

5 Things You Can Do to Protect your Digital Privacy

5 Things You Can Do to Protect your Digital Privacy

In a world where much of our lives are spent online, keeping your personal data secure is paramount. Hackers and cyber criminals can use personal information found online to gain access into your a...

How to use Facebook’s updated Privacy Checkup tool

How to use Facebook’s updated Privacy Checkup tool

What is Facebook’s Privacy Checkup?Facebook’s Privacy Checkup tool is meant to help make it easier for users to understand their current privacy and security settings. This includes helping users t...

How Much Does Cybercrime Cost?

How Much Does Cybercrime Cost?

By the Year 2021, Losses from Cyber Crimes May Reach Up to $6 Trillion. Just in case you are shocked as indeed you should be, the title you just read is very true. According to a report by Aon, int...

Best Privacy Apps For iPhone. Protect your iPhone's data!

Best Privacy Apps For iPhone. Protect your iPhone's data!

Like any other iPhone user, you probably have lots of private data on your iPhone, like personal photos and, business information, passwords, and personal journals. The best way to protect all of t...

How Do I Make My iPhone Completely Private?

How Do I Make My iPhone Completely Private?

As privacy continues to be a major concern for users of various mobile devices today, iPhone users are not in any way exempt. Data mining and access to personal information have become something th...

The Age of Surveillance Capitalism has Begun.

The Age of Surveillance Capitalism has Begun.

If you’ve not heard of Shoshana Zuboff, social psychologist and also a former professor at Harvard Business School, then chances are that you may not be very familiar with this term. The term “Surv...

Understanding the Risks of Using Public Charging Stations

Understanding the Risks of Using Public Charging Stations

Many of us cannot bear to have our phones run out of juice. When the battery runs down, we feel like a part of our lives has been put on hold. That is why we are so eager to charge our phones so we...

How Do I Make My Netflix Profile Private?

How Do I Make My Netflix Profile Private?

Hey! Netflix is just an entertainment platform so why will I want to make my Netflix profile private? We live in a time when practically everything we do that requires an internet connection or dat...

What is IOT and how does it work?

What is IOT and how does it work?

“The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to...

iOS 13 Privacy and Security Features You Should Know

iOS 13 Privacy and Security Features You Should Know

With security and privacy taking center stage in the world of information technology, one of the most important factors anyone should consider when purchasing a mobile device or any kind of IT equi...

Ring Doorbell: Invasion of Privacy?

Ring Doorbell: Invasion of Privacy?

What! Doorbell an invasion of privacy? Whose privacy exactly? With the constantly escalating privacy wars going on today, the attention of the world has been drawn to the potential privacy issue th...

Webcam Malware

Webcam Malware

Webcams are versatile and convenient. They allow us to stay connected to friends and family, make video conferences with our colleagues and much much more. But like all good things in life, there i...

A Consumer's Guide to the California Consumer Privacy Act (CCPA)

A Consumer's Guide to the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) is a new privacy law aimed at protecting California consumers by establishing new privacy rights. The CCPA, also known as AB 375, was put into effect on J...

Cybersecurity Spending

Cybersecurity Spending

In the past few years, we are witnessing an explosion of data breach cases, cybersecurity and ransomware attacks on small, medium-sized and even big companies. It is very unlikely there will be a d...

How to increase my Android privacy?

How to increase my Android privacy?

Our focus in this article is android privacy since android users are rightfully skeptical about the privacy of their devices. Given that the number of people who use at least one Android device aro...

How To Keep Your Passport Safe?

How To Keep Your Passport Safe?

In many countries, the passport not only serves as a travel document but also a proof of citizenship, identity, age, and address. Applying for a new passport can be a tedious and expensive process ...

How To Remove Personal Information From The Internet

How To Remove Personal Information From The Internet

Without any doubt, the internet has brought us many good things. Fast, easy and accessible communications, it has changed the way we travel, entertain ourselves, and even cook. However, one distinc...

Addressing Privacy Concerns of Smart Home Devices

Addressing Privacy Concerns of Smart Home Devices

Privacy! How much does it mean to us? We all love the idea of walking into our homes and conveniently using our voices to control the lights, temperature, turn on the television, make a phone call,...

Cybercrime - How Hackers Can Take Control of Your Webcam

Cybercrime - How Hackers Can Take Control of Your Webcam

While this post is not about teaching anyone the arts of cybercrime, it is likely that some of us may have been wondering how on earth someone can remotely take control of our laptop’s camera to be...

Preventing RFID Skimming - A Simple but Effective Approach

Preventing RFID Skimming - A Simple but Effective Approach

In a previous article we attempted to highlight the risks and process of RFID skimming. In that brief post, we simply identified some of the obvious risks without really proffering any solution. To...

Understanding the Role of VPNs in Security and Privacy

Understanding the Role of VPNs in Security and Privacy

Security and privacy are big issues in our world today. This is largely because the world is moving steadily and surely into a full blown digital age where almost everything is done across digital ...

RFID Skimming - Understanding the Threats and Process

RFID Skimming - Understanding the Threats and Process

RFID skimming is something that many regular folks may not fully understand despite that fact that they are likely the worse hit. As the world continues its march toward a complete dependence on te...

How does a RFID Card work?

How does a RFID Card work?

Introduction about how does a RFID card work Smart Cards have found many applications not only in the finance and payments industry but also in identity management, access control, logistics, healt...