Security Cloud Privacy Tech

Tagged as 'Privacy'

50 Million Facebook Accounts Hacked?!?

50 million Facebook accounts were hacked. Facebook responded quickly to the issue but could’ve done better communicating throughout. Here’s what you need to know about the hack.

Facebook, Shadow Profiles, & Data Brokers

A recent study proved that Facebook uses more information about you than you realize. Behind the scenes, Facebook compiles “shadow profiles” from various sources in order to better target ads…anyone surprised?

End-to-end Encryption & WhatsApp

In the recent dust up with the founders of WhatsApp, you might have heard the term “end-to-end encryption”. What is it? What does it means for you? Why was it frustrating efforts to data mine and monetize WhatsApp?

Cybersecurity Basics #10 – Personally Identifiable Information

Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.

Family Locator Apps

Should you track your children’s every move? Your partners? Family locator apps promise safety and convenience but are they really just an invasion of privacy?

Cybersecurity Basics #5 – Encryption

Encryption: what is it? why does it work?

VPNs

VPNs can help secure your internet traffic when you’re travelling. They can help you route around geographic restrictions. But is using a VPN exposing you to more risk? What is the impact of centralizing all of your internet requests with one s...

G Suite for Education

GMail in the classroom just like on your phone. The promise of G Suite for Education is enticing. A low-cost way for schools to provide collaboration tools to students and teachers. But what are the privacy implications of letting the search giant in...

Facial Recognition Discussion Required

Facial recognition is a technology that exemplifies the underlying neutrality of most technology. When used with positive intentions it makes out devices more secure. When in the wrong hands, it can violate privacy on a massive scale. Do we need to r...

Fortnite a Good Example

Over the few years, mobile has become the dominant platform for gaming. As a result, smaller, simple games have come to prominence. In order to make money developers have (over) rotated on in-app purchases. Fortnite is a great example of an addictive...

Apple, Graylock, And Context

With iOS 12, Apple will reduce the time an iOS device responds to the USB port when locked down to an hour. Having a hard time understanding why that matters to you? It’s because it really won’t. It is however a gap in the security postu...

Google In Schools

G Suite for Education is making waves in the Canadian education market. And why not? It looks like a win-win-win. Too good to be true?

« Previous Page
Next Page »