BullGuard has released a valuable guide to protecting children online. It’s packed with practical tips, the results of a parents’ survey, further references and simple common sense advice. In a seemingly complex area it’s a beacon of simple and sound advice that will help you keep your kids safe online.
Tired of receiving an avalanche of unwanted Facebook notifications? Fed up of being stalked by ads that you never asked for? Bombarded by the seemingly endless notification messages in your personal email? Help is at hand. You can block unwanted notifications with ease when you know how.
There are over one billion smartphones in use today. It’s an enormous number and to put it in context it’s approximately one sixth of the world’s population. Smartphones are powerful tools enabling us to do all sorts of things while on the go. However, they can also track your every move and scoop up reams of personal information – without you knowing anything about it. If your phone has its geo-location services switched on, it most certainly will be monitoring your journeys.
For most people talk of computer code elicits an almighty yawn, it’s the realm of geeks. But code bugs are responsible for some terrible events and even the innocuous, ubiquitous and irrepressibly popular emojis have been recently been exposed as potential carriers of bad things.
Amid the gossip, fury and diplomatic activity over the Sony hack a few important points have been overlooked; thousands of employees had their personal information posted online proving that many organisations can’t be trusted to provide security and cyber actions by nation states are here to stay accompanied by ever louder cries of denial.
The deep web is a vast resource of information much of it academic and of great value. However, there is a shadow side, one where stolen identities are offered for sale, among other things. We explore what the deep web means, why it exists and highlight some of the things you need to be aware of for identity theft protection.
Hackers have turned their attentions to creating false social media ‘likes’ as they follow the money. By revamping an existing virus called Zeus and secretly planting it in thousands of computers there’s a real threat that in time it could also be used to carry out far more damaging actions.
Zeus rules over fake social media
The good news is that cell phone providers are not mandated to store or keep text messages or phone calls that are sent or received from a cell phone. However, you’re probably more at risk when that text message comes in at the wrong time, whether that’s while you’re on a date, at a meeting or asleep. Typically these aren’t major situations, however what happens when a private message is seen by someone who shouldn’t have seen it?
It’s not new news that texting has taken over. You’ve got at least one friend that doesn’t like to talk on the phone anymore, and only texts. That friend isn’t alone, in fact, 55% of those that text a lot, agree they’d rather text than talk.
Good News! The EU Commission has put in place a process for how telecom operators need to handle incidents of online privacy breaches and identity theft. This is a massive step forward in the defence of customer data. The technical measures have been implemented to ensure all victims of customer data breaches receive equal treatment as well as a solid response from the telecom operators responsible for the privacy and safety of that data.