Home » Image » Page 13

Image

Social Media Spying: What your Favorite Websites are Tracking

  • News
  • 6 min read

The websites you visit every day, like Facebook, Tumblr, Instagram, and Twitter, are tracking nearly every move you make online. Social media spying has started to come out in the limelight as more people are becoming curious as to what data they’re taking from you, and how invasive they are.

Having an informed opinion about the social media spying that is going on can help you fight back against them by voicing an informed opinion, and by changing your privacy settings. Read this article to see what the Big Four are up to.Read More »Social Media Spying: What your Favorite Websites are Tracking

10 Reasons to Use a VPN Service Provider

Too many people seem to think that no one would ever want to steal their data or hack them. If you think you’re nobody and that no one would be interested in you, think about your online banking, your passwords, your online shipping, and the access you have to the iTunes store. Those are all points of attack for a hacker.

All those reasons, and many more, will be explored in this article on 10 reasons to use a VPN service provider.Read More »10 Reasons to Use a VPN Service Provider

BYOD and Mobile Device Risks for your Business

The movement for BYOD, and the flexibility being afforded to workers to use mobile devices of their own choosing, can be freeing for some. For others, such as the cybersecurity conscious, it can be a bit of a nightmare of all new mobile device risks to deal with.

Common precautions that were once on every device in your network may not be taken anymore. Here are a few rules you should institute for BYOD devices so that you can minimise the risks associated with allowing mobile devices into your workflow.Read More »BYOD and Mobile Device Risks for your Business

A Beginners Guide to Net Neutrality

  • News
  • 5 min read

With the Internet packed full of net neutrality debate ahead of tomorrow’s (Feb 26th 2015) vote on net neutrality in the USA, it’s important for those who don’t know to get themselves up to speed.

To get outside of the Internet and show you a real world simile: Imagine if your TV only worked with one cable provider, and that you have no option based on your TV which shows you could watch. Right now, you can buy any TV, plug it into the wall, and choose how you want to connect – cable, satellite, even bunny ears, as well as which provider will be selling you this service.

When it comes to the Internet, neutrality has a huge impact on how you can get information in a timely manner. This applies both to how quickly you can access that data, and how easy it is to find.Read More »A Beginners Guide to Net Neutrality

The Ongoing Controversy Around Hide My Ass Logging

The subject of logging and VPNs is an important one to pay attention to when you’re considering how protected you want to be. A VPN provider which continually comes up in discussions around this subject is Hide My Ass, our number two ranked provider.

This is because Hide My Ass logging is a bone that the hacker community likes to pick at every chance they get. I’m going to look at why we still rank Hide My Ass at number 2 despite their logging policy, and expand on the issues some face with this provider.Read More »The Ongoing Controversy Around Hide My Ass Logging

The New Facebook Privacy Policy Change: You’re Being Followed

  • News
  • 4 min read

You won’t catch me on Facebook, but those which do use the big blue lowercase f have even more privacy concerns that they should be aware of. I know that being privacy aware isn’t a big concern for many people out there who share sexts on a daily basis and post their every thought somewhere online. For those who are more privacy aware, read on to find out more about Facebook privacy as it is today.
Read More »The New Facebook Privacy Policy Change: You’re Being Followed

Cybersecurity for your Family and Home

The next life skill that needs to be taught to kids at a young age is cybersecurity for the home, and for the whole family. When I was a teenager and the Internet first came to my city, the only cybersecurity for the home concerns were not meeting strangers you met online, and not giving out passwords.

Things have changed since then. Hackers are more sophisticated and better equipped. And the amount of data at stake has reached exponential levels. You can do plenty to increase your home cybersecurity, and keep your family safer from identity theft and a host of other malicious online attacks. Read More »Cybersecurity for your Family and Home

The EFF, VPNs, and Encrypting your Computer Data

The question of who owns your private computer data should have an obvious answer: you own your data. The reality, however, is quite different. There are countless websites tracking you and taking your data without your knowledge. There are hackers who are trying everyday to own your data. And lastly, there is the police who believe that they can take your computer data whenever they want – even when you’re completely innocent and not under investigation!

Encrypting your computer data is a way to take ownership of your data. But is it always good for you? Is some of it bad, even illegal? And who are the parties involved in all this? All that, and more, in this article!Read More »The EFF, VPNs, and Encrypting your Computer Data

5 Online Security Goals for your Business this Year

I’m sure you noticed this, but there were a lot of security breaches in 2014. You can read a list of the worst breaches here, but I’m sure you know of at least a few just from general media. Your online security goals need to be stepped up if you hope to protect your business. The odds are good that cyber criminals just haven’t bothered targeting if you weren’t hacked and don’t have these plans in place!Read More »5 Online Security Goals for your Business this Year