Kids’ toys have serious privacy problems
Think connected toys for kids are more secure than those for adults? Think again.
249 articles
Think connected toys for kids are more secure than those for adults? Think again.
One day I found out that someone was passing off my photos as their own. Here’s what I did.
There’s been a lot of talk lately about privacy protection and VPNs. But what exactly is a VPN? We explain in simple words.
Attentive listeners such as Apple Siri and Amazon Echo have settled down in our houses. What’s the harm?
Cameras in buildings, public areas, and even at home spy on us without our knowledge or consent. What can we do about it?
The days of dropping cheesy pick-up lines at social gatherings are coming to an end. With dating websites and apps, it has become way easier to find a partner online. But is it safe?
When web services collapse, they bury users’ data under their ruins. How can we solve this problem?
Why does a ‘make-over’ app require your location, private data and your phones IMEI number? Something’s not right.
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
The tracking tools used by digital marketers are so ubiquitous that it’s really hard to avoid mass Web surveillance. However, our Private Browsing can help you protect your privacy.
Do you really think you are the owner of your data? Watch the video with Evgeny Chereshnev from TedX Kazan and think again
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
How criminals use fake Wi-Fi hotspots to steal data, and how you can use our solutions to protect yourself.