How to increase my Android privacy?
Our focus in this article is android privacy since android users are rightfully skeptical about the privacy of their devices. Given that the number of people who use at least one Android device around the world has now been predicted at about 2.5 billion, it is very important that we look at how to ensure […]
How Much Does Cybercrime Cost?
By the Year 2021, Losses from Cyber Crimes May Reach Up to $6 Trillion. Just in case you are shocked as indeed you should be, the title you just read is very true. According to a report by Aon, interestingly titled “Prepare for the Expected: Safeguarding Value in the Era of Cyber Risk”, the cumulative […]
Ring Doorbell: Invasion of Privacy?
What! Doorbell an invasion of privacy? Whose privacy exactly? With the constantly escalating privacy wars going on today, the attention of the world has been drawn to the potential privacy issue that our own home security system may portend. Most doorbells today now have cameras and a lot of them record footage that is stored […]
How To Keep Your Passport Safe?
In many countries, the passport not only serves as a travel document but also a proof of citizenship, identity, age, and address. Applying for a new passport can be a tedious and expensive process depending on where you live and may require notarized documents and/or verification of identity and address proof by government officials. Small […]
How Do I Make My iPhone Completely Private?
As privacy continues to be a major concern for users of various mobile devices today, iPhone users are not in any way exempt. Data mining and access to personal information have become something that even the most trusted of companies now engage in. While we wait for such a time when there will be adequate […]
How to Set Your Facebook Account to Private
We all have loads of fun on Facebook. People love to share every single detail about their lives and those of their families. We just bought a new car! We are vacationing in the Bahamas and other information that is not necessarily important for everyone to know. Have you really ever thought about the possible […]
Is “The Great Hack” a True Story?
A lot of people ask if “The Great Hack” is based on a true story. Have you seen the Netflix movie or documentary “The Great Hack”? If you haven’t, then you should really try to or at least you can read a review of it here. Once again, brought to the fore is the issue […]
How does a RFID Card work?
Introduction about how does a RFID card work Smart Cards have found many applications not only in the finance and payments industry but also in identity management, access control, logistics, healthcare, transportation, mobile communication, etc. As the applications of smart cards have grown, smart card technology has also evolved from simple magnetic stripe cards to […]
Article 13 and Its Implication for Internet Privacy
Since the EU passed the highly controversial Article 13, a lot of concerns have been raised. Discussions aimed at addressing its likely effect on the internet and its users have been rampant. Most people are complaining about how it will stifle creativity and stem the emerging culture of the internet. The internet might just become something […]
Preventing RFID Skimming – A Simple but Effective Approach
In a previous article we attempted to highlight the risks and process of RFID skimming. In that brief post, we simply identified some of the obvious risks without really proffering any solution. Today, we will be looking at some simple but effective ways of preventing RFID skimming. From our last post, we understood that the […]