Continue Reading

Change your computer’s settings to stop programs from spying on you

You are well-known to your phone. It monitors your location, browsing habits, downloads, and other activities. Find out how to tell when your phone’s camera or microphone is being used by visiting this page.

Continue Reading

Your Deepest Secrets are Not Safe with Your ISP

If you were expecting a piece of feel-good news, unfortunately this isn’t it. Unless you are like me, and find relaxation in reading articles which are gravely concerning for the future of privacy and digital human rights. Either way, we got you covered: A recent study conducted by the Federal Trade Commission (FTC) put major league internet service providers on the line; and what they found might have you logging off. The FTC issued orders for information on consumer data practices, privacy, and the companies transparency in regards to such practices, and what they found was pretty horrifying.

Continue Reading

Yes, Facebook’s Data Mining is a Problem

Yes, Facebook has once again admitted that there is seriously a problem with the way they are handling user data. Are we really that surprised? Maybe this is the first time you’ve seen the news that Facebook’s privacy issues are spiraling out of control. Or perhaps this is the first time you’ve cared to search for it. This isn’t a new occurrence.

Continue Reading

Data Broker was Selling Location-Tracking Data of People Visiting Abortion Providers

So a date broker was selling the location-tracking data of people visiting abortion providers. Data about all sorts of things holds value, and in today’s world, your data holds plenty. Like it or not, your data has almost definitely already been bought and sold. Just like mine, just like nearly every other person’s in the good ol’ US of A. Of course, it would be nice if you or I had some say in the matter. Personally, I would not freely consent to my data being bought or sold without providing me a benefit, and that is precisely the reason why I don’t have any say in the matter.

Hackers Target WHO Amidst the Covid-19 Pandemic
Continue Reading

Internet Crime Gang Stealing Reward Points and Gift Cards Out of Email Inboxes

Talk about cherry picking! An international Internet crime gang is gaining access to as many as 100,000 compromised email inboxes a day, and all they are doing is searching for and stealing digital gift cards and rewards points.

tmobile hacked
Continue Reading

Massive T-Mobile Data Breach of User Personal Information Includes Social Security Numbers

A massive security breach at T-Mobile has exposed the personal private data of nearly 50million T-Mobile customers and prospects, including social security numbers and drivers license numbers. And it doesn’t matter whether you are a current, past, or even prospective customer of T-Mobile, your data has been compromised. By “prospective” we mean someone who has applied for an account with T-Mobile even if they never actually signed up. And that is because the T-Mobile data breach includes those social security numbers which are, of course, required for just about every service that is going to extend credit to you.

cit0day citoday data breach
Continue Reading

Enormous Collection of Over 23000 Breached Databases Leaked with the Cit0Day Data Breach – and What to Do About It

The Cit0Day index collection contains the breached user email addresses and passwords of more than 23000 services, likely including yours.

shopify data breach
Continue Reading

Shopify Data Breach Puts Thousands at Risk

Shopify has had a data breach affecting thousands of their merchants’ customers. They were not hacked, it was an inside job.

Biometrics such as the retinal scan is one of the ulti-factor authentication methods
Continue Reading

Multi-factor Authentication and Why You Need It

As the threat of cyberattacks keeps on increasing, individuals and organizations need to take the necessary steps to protect their data. One of the tried and tested ways of deterring data breaches is using multi-factor authentication, commonly known as MFA. The primary reason MFA is hailed as an effective method…

NSA is Telling Mobile Users to Turn Off Find My Phone, WiFi, and Bluetooth
Continue Reading

The NSA is Telling Mobile Users to Turn Off Find My Phone, WiFi, and Bluetooth. Here’s Why

The National Security Agency (NSA) is recommending that people who are concerned about privacy turn off Wi-Fi, Find-My-Phone, and Bluetooth whenever they do not need to use those services. Yes, this is the same NSA about whom we have written in the past, including for being spanked by the court…

Instacart Denies Data Breach as More Than 250,000 Instacart Customer's PII is for Sale on the Dark Web
Continue Reading

Instacart Denies Data Breach, Blames Customers, as More Than 250,000 Instacart Customer’s PII is for Sale on the Dark Web

Insacart is denying a data breach of more than 250,000 customer records, and is instead blaming customers for their info being for sale on the dark web.

Does Private or Incognito Mode Make Browsing Anonymous
Continue Reading

Does Private or Incognito Mode Make Browsing Anonymous?

By now you know that your online activities are an open secret and can be tracked by various parties. While some users resort to deploying VPNs, others activate the incognito or private mode when browsing to keep their online activities away from prying eyes. So, how private is the incognito…

Is It Possible to Delete Yourself From The Internet?
Continue Reading

Is It Possible to Delete Yourself From The Internet?

In our interconnected world, almost everyone knows something about everyone else. So, if you want to find out what a particular celeb was wearing, what places they frequent, or any of their recent scandals, a basic search online is likely to get the desired results. Easy-peasy, right? Welcome to the…

Ransomware: Maze ransomware attack have become quite common
Continue Reading

The Cognizant Breach: What You Should Know About Maze Ransomware Attacks

Cognizant, an American company providing IT services based in Teaneck, New Jersey, is one of the latest victims of the infamous Maze ransomware. The IT services provider operating in more than 37 countries, with a turnover of $16bn, said the attack took place on Friday, April 17th. According to the…

Hackers Target WHO Amidst the Covid-19 Pandemic
Continue Reading

Hackers Target WHO Amidst the Covid-19 Pandemic

Hackers attempted to break into the World Health Organization (WHO) early this month. World Health Organization Information Security Officer, Flavio Aggio said the attempt did not succeed but warned that hackers have increased their attacks on the agency in the face of Covid-19 which has killed thousands of people worldwide….