If you’re planning to sell your computer you need to wipe your hard drive before doing so. If you don’t you, could be inadvertently revealing all that you have done, saved and deleted on your computer to a stranger.
E-book readers are great, right? But are you aware that they also gather data on all of your reading habits? And in the US this information can be used to prosecute individuals. Of course, e-book manufacturers don’t tell you this. And while shops like Amazon talk about protecting privacy, what they do with data from its Kindle e-reader for instance, is buried in thousands of words of legal jargon. It’s certainly not upfront and straightforward. They don’t say ‘we spy on your reading habits, but that is what they do. But you can stop it, if you want to.
You can chat, post, like and get some banter going with friends – even if you’re 5,000 miles away. But there are enough unsavoury characters trawling these sites that it’s necessary to raise a red flag. There are also enough deep digital potholes for the unwary to stumble into that you really need to be mindful too. You can make sure you’re always safe by following these top ten safety tips.
The release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?
Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think.
The loss of privacy in the Internet age is a reality. Depending on the browser and services you use, your every click, website review, and online purchase can be collected, analysed and used to create a profile that’s readily sold off to advertisers and others. Do you really want to shrug your shoulders and say your privacy doesn’t matter?
The internet is so huge; no one will attack my computer. This is a common belief. And it’s a myth. Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch a thousand attacks and more. Find out why it’s not personal but you’re just as much as a target as the big bank on the corner.
BullGuard has released a valuable guide to protecting children online. It’s packed with practical tips, the results of a parents’ survey, further references and simple common sense advice. In a seemingly complex area it’s a beacon of simple and sound advice that will help you keep your kids safe online.
With so many attacks aimed at everyday computer users, it’s often difficult to nail hacker motives. But a recent analysis of cyber theft during 2014 data reveals a startling new trend – ID theft is the top priority for hackers, over and above credit card information theft for example. In the light of these figures, if you weren’t already, it’s time to get serious about protection.