Digital Immortality

Is it possible to achieve immortality- at least for your digital persona ? This graphic goes a bit black but you should know where your social media accounts go after you die.

Background Checks 101 Dec04

Background Checks 101

Our past talks about ourselves. Background checks are a common method of accrediting decency, integrity and solvency of either an individual, company or organization. However, there’s a thin line between investigation and privacy violation. Get to know the basics behind background checking.

Healthcare.gov not Working

More than one month after Healthcare.gov was launched, trouble has plagued the website. The high volume of visitors exposed many of the website’s capacity and software weaknesses. The following infographic quantifies the shortcomings and glitches that caused the thumb down of the public.

Social Media Privacy Breach

Are you feeling safe while “playing” with the various social media networks? Identity theft incidents are becoming more than common. NextAdvisor alerts users about the risks lurking across social networks and gives some generic protection tips.

Password Weakness

Internet has gone wild and according to experts, even the strongest password can be cracked depending on the time and effort a skilled hacker would put on. This report highlights the common password weaknesses and hacking methods and suggests some best practices to protect your online information until the coming of new age in authentication methods.

How Internet Tracking Works Dec11

How Internet Tracking Works

Transparency and security on the internet is an issue that has raised concern among users and governments. Internet tracking has significantly advanced in an effort to rake personal data, behavioral patterns and preferences. And that is mostly to favor of online advertising purposes. See how it works.

Online Privacy Fears Nov15

Online Privacy Fears

What is your greatest fear about your digital life? Explore the real face of online privacy phobias that today internet users encounter both for their pesonal and family public exposure. it’s mostly about how we do things online and what we know about security issues.

Personal Data Privacy

As we are getting more and more social, as we are further adopting various cloud services that facilitate our daily motions, our personal data are exposed and circulate online. This study reports on the European user perception of data privacy in the ever changing web context.

Consumers on Data Brokers Oct23

Consumers on Data Brokers

Do you know what a data broker is? Trusted ID surveyed 2960 Americans in an effort to disclose the obscure idea consumers have around data brokers’ activities. The majority of the respondents require more transparency.

Social Networks Privacy Risks

Trend Micro awakes us with an overview on the type of information we publicly share on social networks and the risks involved. Everything you post can and will be used against you!

Password Theft Statistics 2012 Sep11

Password Theft Statistics 2012

Passwords dominate our daily life as they have evolved to key-controllers of our major activities and transactions. But how safe do you feel about your personal information against cybercrime in 2012?

Apps And Personal Information

Turning to a digital living mostly entails networking and sharing online and that means exposure in turns. We vastly share and publish information through sites, apps or various devices for which we have little knowledge about their personal data policy. Look how you can protect yourself.