Nov 18
Why Spy on Reporters When You Can Spy on CEOs?

Canadians have been shocked to learn that police in this country have for the second time this year admitted to spying on reporters. What makes the recent disclosures most ironic is not that police officers were the ultimate targets, or that spying was approved in the absence of an actual judge—but that much of the meta-data sought by Montreal police may have already existed on a government server, and could have been obtained without a warrant, thanks to the enactment of the Anti-Terrorism Act (known as “Bill C-51”).

In fact, in his latest annual report to Parliament, Canada’s Privacy Commissioner identified 58 such instances where Canadians’ information was collected and shared without prior judicial approval in the first six months of this year alone. READ MORE “Why Spy on Reporters When You Can Spy on CEOs?”

Share:
Sep 26
What Do Website Security Certificates Actually Do for Your Privacy?

Website security certificates are the silent superheroes protecting consumer data and encrypting browser sessions, but do you even know how they work?

Share:

How many times have you clicked away browser warnings about expired or incorrect security certificates?

Probably too many for you to even remember, right?

The truth is, most people are totally clueless about how security certificates, “https” websites, and SSL really work to protect their online privacy and data (hint: they’re all the same).

As the staff over at no-track search engine DuckDuckGo tell us, every secure website relies on a two-part process to make sure information is sent securely and received by the correct individuals.

So whether you’re sending credit card information to your favorite online store or uploading your vacation photos to your cloud-based storage drive, security certificates make the internet a safer place—but only when they’re allowed to do their job.

Today we’ll clue you in as to why security certificates matter. We’ll even show you what you can do to make sure your online security isn’t at risk. READ MORE “What Do Website Security Certificates Actually Do for Your Privacy?”

Share:
Sep 12
How to Talk to Your Teen About Internet Privacy (Without Being Lame or Ignored)

It’s not a fun task to speak with your teenager about their internet privacy, but it has to be done. Learn the best tips for easy communication today:

Share:

Here’s a fun fact to make you think: every teenager under the age of 16 was born after the year 2000.

They were born years after Google was founded; they were in diapers when Facebook was still courting college freshmen; and most of them shared their first Instagram post before they were out of junior high school.

Bet that makes you feel old, right?

Teens these days have grown up with the internet and social media all around them. They’ve never known what it’s like to not be connected.

While it’s awesome that our youth is so comfortable with technology, there’s a sort of naive ignorance that comes along with pre-established technology.

When new technology comes out, we’re all curious and skeptical about it; we need to find out how it works. However, when you grow up with technology that’s already established, you don’t tend to question it; you take it for granted and go with the flow.

For example, you probably never questioned why your old teachers’ photocopies in school always had purple ink; you just took your quiz and waited excitedly for recess.

But this is exactly what’s so troubling for teens online: they have no idea how compromised their online privacy can become with just a few easy-to-avoid missteps.

That’s why today we’re going to discuss everything your teen needs to know to protect their online privacy—and we’ll even share our favorite tips for easy communication so you can start the discussion off on the right foot. READ MORE “How to Talk to Your Teen About Internet Privacy (Without Being Lame or Ignored)”

Share:
Sep 5
How to Keep Your Emails Confidential and Secure

You don’t have to be a high-ranking government official or rich celebrity to have your emails spied on. Learn how to protect the privacy of your emails now:

Share:

Email hacks involving celebrities, government officials, and major corporations have become hot news topics, but have you ever thought about the damage an email attack could inflict upon your life?

Sure, you probably don’t think you’re a target since you don’t have millions of dollars in your bank account or the codes to launch nuclear war in your inbox.

But you’d be totally wrong.

Your email data is exactly the kind of prey hackers, advertisers, and employers are looking for.

The real kicker is that most people aren’t even aware that their emails are so vulnerable.

To protect your emails and learn what’s at stake, we take a further look at who’s really peeking in your inbox — and what you can do about it. READ MORE “How to Keep Your Emails Confidential and Secure”

Share:
Aug 29
The Top CyberSecurity Tools Recommended by IT Professionals

IT professionals know how to protect confidential information from hackers. Check out their favorite easy-to-use cybersecurity tools and you will too:

Share:

If you feel like protecting your online privacy is just as exhausting as having another part-time job, you’re not alone.

Between creating and remembering different passwords, to managing your mobile app permissions, it’s getting harder everyday just to keep up with hackers and information-stealing companies in our digital world.

Now just imagine what it’s like to be an IT professional protecting the sensitive information of large companies and tons of consumers around the clock. Yikes!

IT professionals know what kind of nefarious activity takes place in the darkest corners of the internet—and they also know a thing or two about how to ward off malicious threats and protect your private information, too.

Today we’re going to talk about our favorite easy-to-use cybersecurity tools that are strong enough for professional use and simple enough for those of us with day jobs outside the IT world. READ MORE “The Top CyberSecurity Tools Recommended by IT Professionals”

Share:
Aug 26
The Most Common Online Threats You Need to Worry About

You can’t protect your privacy if you don’t know what you need protection from. We’ll cover the specific online threats you need to watch out for today:

Share:

You hear it all the time: The internet is not a safe place.

From foreign hackers to suspicious websites and emails, it’s becoming easier to get access to your most private—and valuable—information online, even though we’re all supposedly becoming wiser to our security vulnerabilities.

Hacking is now a household word, partly because new tools to get the job done faster are becoming more available. Plus, these techniques are becoming so efficient that users with even the most basic skills can accomplish hacks with damaging effects.

Most people believe they’re protected because they have a standard version of antivirus software that came pre-installed on their laptop five years ago. Don’t be this naive.

The key to protecting yourself from online threats is arming yourself with information about them. Then you’ll know how to stop them before they harm your life or business.

Believe us, when a hacker knows your weaknesses, or the security holes you never bothered to patch or update to fix, they’ll totally use this intel to their advantage. You should be just as informed about what they can do.

These are the most common online threats you need to worry about. READ MORE “The Most Common Online Threats You Need to Worry About”

Share:
Aug 24
The Hidden Dangers of Mobile Payment Apps

Everyone expects mobile payment apps to be more secure than they really are. Are you sacrificing privacy at the price of convenience? Learn more:

Share:

New research numbers show that more than 25% of US smartphone owners use mobile payment apps at least once a month.

You may do all of your banking on a mobile app, or pay your credit cards with one or several. Maybe you even use peer-to-peer payment apps such as PayPal’s Venmo to pay the babysitter, or buy your morning coffee with the Starbucks app.

Apps like these make it convenient to manage all of your personal finances right in the palm of your hand. But would you still love your on-the-go convenience payment apps if they came at a steep price?

Well, actually, they do. No, we’re not talking about usage fees, though those certainly exist; we’re talking about risking your privacy and online security.

The truth is, mobile payment apps are way less secure than we’ve been led to believe. We’ve been trusting these apps with our most valuable and private information—bank account numbers, credit card security codes, etc.—but what if we’ve been living in a fool’s paradise this whole time?

Oh wait! We have… READ MORE “The Hidden Dangers of Mobile Payment Apps”

Share:
Jul 7
7 Ways to Preserve Your Privacy Online

Want to know how to preserve your already limited privacy? We dive into seven different ways you can up your online privacy game.

Share:

Privacy is becoming a rarity these days. There’s probably enough information floating around about you online that it wouldn’t be too difficult to build an accurate representation of who you are offline.

Governments, corporations, advertisers. There’s a giant war going on online, and you’re in the middle of it. Your data, your attention, your very soul is at risk. Beyond companies bidding over your precious data, there are a ton of other risks lurking online, like malware, viruses, phishing, and identity theft scams.

Yikes! Maybe it’s time to unplug and go off the grid. But, if you’re like me (and anyone else who needs the Internet to function, so, um, everyone), there is another way. It just takes a little bit more effort on your part. But when you think of all the potentially disastrous consequences that can be avoided, you’ll probably see it as a great investment.

Below we highlight seven different ways you can preserve and protect your privacy online without sacrificing your sanity. READ MORE “7 Ways to Preserve Your Privacy Online”

Share:
Jun 20
Your Attention Is Being Sold to the Highest Bidder: How We’ve All Become Products

We’ve slowly transitioned from living, breathing humans into nothing more than a set of eyeballs advertisers can buy. How did this happen? We explore in this post.

Share:

Every single second you are being sold. Did you feel it? Maybe not. Because it’s subtle. And we’ve grown used to it. 

Your attention currently powers the greatest corporations of our time. Most of the current innovations across Google, Facebook, and other internet giants are funded by our eyeballs. Our focused attention.

These giant networks sell our attention to advertisers who then sell us products that are based upon the data these companies provided them. How else do you think the sidebar ads that keep showing up are strangely compelling and begging you to click?

Below we look at why advertisers are battling over our attention and what we can do to protect ourselves from this raging war. READ MORE “Your Attention Is Being Sold to the Highest Bidder: How We’ve All Become Products”

Share:
Jun 13
Why Protecting Your Children’s Online Rights Is Your Responsibility

As a parent, it’s important for you to take your child’s online privacy seriously. Inside, we illustrate why—as well as what you can do to improve it.

Share:

Kids are connected to the Internet and using smartphones and tablets at an earlier age than ever before. As a parent, this only adds to your list of things you need to manage and stay on top of.

Sharing personal information about your children freely and letting them browse the web with wild abandon will only lead to problems later on.

Below we illuminate why protecting your children’s digital sovereignty is your responsibility, and give you a few ways you can help to mitigate the negative consequences of Internet and social media connectivity from a young age. READ MORE “Why Protecting Your Children’s Online Rights Is Your Responsibility”

Share: