Forget the new iPhones: Apple’s best product is now privacy

Apple makes its hundreds of billions every year by selling physical products that have a high markup. Facebook and Google, on the other hand, have a business model built around advertisers who want as much data about users as possible so they can better target them. This is why, for example, Google would never build the types of anti-tracking and privacy protections into the Android OS that Apple has done with MacOS and iOS. Google–and Facebook–aren’t going to cut off their access to all that black gold.

 

Fastcompany.com click the link to read the rest of the story.

Are you willing to pay for more privacy?Join the conversation on our Facebook Page!

8 Smart Ways To Maintain Your Digital Privacy

Regardless of how you use the internet, it’s nearly guaranteed that you are being tracked in some way. Natalie Triedman recently shared how people, often unknowingly, are sharing their location. We aren’t saying that you should freak out and stop using the internet, but it’s a good idea to be smart about your browsing.

Follow these tips to start protecting your information online. We’ve included some quick steps that everyone can do, as well as some more difficult and advanced methods for keeping your web data secure.

Hackernoon.com click the link to read the rest of the story.

Are you concerned about your browser tracking you?Join the conversation on our Facebook Page!

This powerful off-the-shelf phone-hacking tool is spreading

Researchers at internet watchdog Citizen Lab have found that a sophisticated piece of spyware designed to break into most commercially available smartphones is now in use in 45 countries. Pegasus, designed by Israeli security firm NSO Group, has been pitched as a so-called “lawful intercept” tool for governments with highly questionable human rights records like Bahrain, United Arab Emirates, and Saudi Arabia.

fastcompany.com click the link to read the rest of the story.

Are you concerned about someone hacking your phone?Join the conversation on our Facebook Page!

IN CYBERWAR, THERE ARE NO RULES

It won’t be cutting-edge cyberattacks that cause the much-feared cyber-Pearl Harbor in the United States or elsewhere. Instead, it will likely be mundane strikes against industrial control systems, transportation networks, and health care providers—because their infrastructure is out of date, poorly maintained, ill-understood, and often unpatchable. Worse will be the invisible manipulation of public opinion and election outcomes using digital tools such as targeted advertising and deep fakes—recordings and videos that can realistically be made via artificial intelligence to sound like any world leader.

ForeignPolicy.com click the link to read the rest of the story.

How secure is your business to cyber warfare?Join the conversation on our Facebook Page!

Online security 101: Tips for protecting your privacy from hackers and spies

People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop.


Zdnet.com click the link to read the rest of the story.

Do you still care about your privacy?Join the conversation on our Facebook Page!

Ultimate guide to finding and killing spyware and stalkerware on your smartphone

This guide will run through what spyware is, what the warning signs of infection are, and how to remove such pestilence from your mobile devices.

Zdnet.com click the link to read the rest of the story.

Have you removed stalkerware?Join the conversation on our Facebook Page!

Is It Really Possible to Use the Internet Privately?

According to USA Today, 75% of the world’s most popular websites have tracking code on their pages. I am not alone in my concern about maintaining some sort of privacy online.

Hackernoon.com click the link to read the rest of the story.

Are you concerned with about internet privacy?Join the conversation on our Facebook Page!

Using a truly private browser — Brave

One of the biggest leaks of privacy on your computer is your browser. Whether the leaks come from the website you browse to (tracking cookies, fingerprinting, etc), from the browser itself (diagnostic info, interest tracking, cloud-based history collection, etc), or from your ISP being able to observe everything you do.  Enter Brave, a browser specifically built from the ground up for privacy.

TheMedium.com click the link to read the rest of the story.

Are you concerned with your privacy?Join the conversation on our Facebook Page!

Password and Credential Management in 2018

Many people will read the headline and probably think: “No, not another piece of advice that I should hash passwords — uh”. But stop. You’ll learn a lot more here. Promised.

We will cover the “perfect” (Nothing is absolutely perfect and of course I would be more than happy for any suggestions for improvements in the comments ?) way to handle password credentials

Medium.com click the link to read the rest of the story.

Are your passwords protected?Join the conversation on our Facebook Page!

Here’s how to see the data that tech giants have about you

As you’ll see, some of these companies have made the job easier than others. It’s also important to note that downloading your data doesn’t take it away from the company in question. Each tech giant will still retain the data it has about you. But at least you’ll have a better sense of what they know.

Fast Company Click the link to read the rest of the story.

Will you download the data?

Join the conversation on our Facebook Page!