I’m sorry to be the bearer of bad news, but when you clear your history to keep your browsing activities confidential, it’s like moving a folder full of confidential documents from your desk into the desk’s drawer. Even though the folder is gone from the direct view of unwanted people, but the documents still exist and can easily be found with a bit of extra effort.Read More
Internet privacy is one of the most talked about topics these days. However, without realizing how your computer actually interacts with the web, it is impossible to achieve that desired peace of mind.
To easily understand what’s going on between your computer and the web when you visit various websites, let’s use a simple analogy.
Think of your computer’s hard drive as a blank diary and your computer’s mouse as a ballpoint pen. Anytime you authorize an action on the web with the click of your mouse – whether it is sending a message on Facebook, buying a new tablet on Amazon.com, looking for the best restaurant in town, watching U2’s latest music video, or checking your balance on your Internet banking site – it’s just like writing an entry in the diary.Read More
Even though government surveillance is nothing new – just think of Caesar’s spies in the Roman Empire, or the KGB in the former Soviet Union – the Snowden revelations made us realize how much it was a part of our modern lives, too. The fact that agency staff could witness private moments of our lives whenever they liked, even if were up to nothing wrong, was a sobering realization to say the least. Being a good citizen, it seems, doesn’t qualify one anymore for being excluded from monitoring so in this post we are looking at techniques that can help you protect your Internet privacy in the face of mass surveillance.Read More
You probably delete dozens of various files from your PC every day. But have you ever wondered what happens to a file after its deletion? How does “deletion” work in the first place? Does a file just disappear from the system without a trace after deletion? Does it become an empty space? What happens to the often confidential information contained in the file? And basically, where do deleted files go?
We are sharing a great video below this post that answers all those questions in a fun and easy-to-follow, yet scientific way. Michael from VSauce walks you through the phases of file deletion and concludes that there is no such thing as “deletion”, only overwriting!Read More
While it’s old news that passwords provide the most important layer of protection for your various business related accounts (emailing, accounting, online banking, PayPal, to name but a few), many small business owners still fail to pay proper attention to crucial details when creating passwords for their confidential accounts.
Working at a privacy company allows me to talk to and gain insight into the privacy practises of small business customers and I’m often shocked to find out how rudimentary mistakes they make when it comes to safeguarding their accounts.Read More