Digital Immortality

Is it possible to achieve immortality- at least for your digital persona ? This graphic goes a bit black but you should know where your social media accounts go after you die.

All Deep Web

You have an option to be completely anonymous online. Here’s an infographic that can guide you about that, and tell you what The Deep Web is.

Device Fingerprinting 101

Have you ever heard about cookies? Not the ones from your mom but rather those on the interwebs. Cookies and brand new Device Fingerprinting are the technologies that track our browsing history and gradually collect data for our online profile and habits. Learn more about how these methods compromise our online privacy.

Background Checks 101 Dec04

Background Checks 101

Our past talks about ourselves. Background checks are a common method of accrediting decency, integrity and solvency of either an individual, company or organization. However, there’s a thin line between investigation and privacy violation. Get to know the basics behind background checking.

Cyber Breach 2013

American internet is of the most dashing worldwide. American Internet services give us some surprising statistics about the the state and volume of cyber security data breach across the US starting from 2005 and up to 2013.

True Cost of Smartphone Loss

The cost of losing a smartphone device is a far cry from the purchase cost. It’s what’s inside that matters most. As smartphones are increasingly turning to life-data memorizers, the thought of potential loss is getting even more upsetting.

Password Weakness

Internet has gone wild and according to experts, even the strongest password can be cracked depending on the time and effort a skilled hacker would put on. This report highlights the common password weaknesses and hacking methods and suggests some best practices to protect your online information until the coming of new age in authentication methods.

How Internet Tracking Works Dec11

How Internet Tracking Works

Transparency and security on the internet is an issue that has raised concern among users and governments. Internet tracking has significantly advanced in an effort to rake personal data, behavioral patterns and preferences. And that is mostly to favor of online advertising purposes. See how it works.

Personal Data Privacy

As we are getting more and more social, as we are further adopting various cloud services that facilitate our daily motions, our personal data are exposed and circulate online. This study reports on the European user perception of data privacy in the ever changing web context.

Consumers on Data Brokers Oct23

Consumers on Data Brokers

Do you know what a data broker is? Trusted ID surveyed 2960 Americans in an effort to disclose the obscure idea consumers have around data brokers’ activities. The majority of the respondents require more transparency.

Social Networks Privacy Risks

Trend Micro awakes us with an overview on the type of information we publicly share on social networks and the risks involved. Everything you post can and will be used against you!

Password Theft Statistics 2012 Sep11

Password Theft Statistics 2012

Passwords dominate our daily life as they have evolved to key-controllers of our major activities and transactions. But how safe do you feel about your personal information against cybercrime in 2012?

Android Malicious Apps

Trend Micro – the leading web security company published this report to pose a worry among mobile users about the usage of personal data stored and collected by sneaky Android apps.

Personalized Data Usage Jul21

Personalized Data Usage

Social sites, search engines and applications are increasingly using your information in an effort to provide personal web experience. Are you aware of the type, method and usage of data drawn by the back-engines? Learn how they do it for 6 of the most popular social networks.

Generation Gap In Computer Security

The gap is everywhere! Digital media and social networks are vastly used by various age groups. Which one seems to be the most aware or less savvy as far the computer security and sensitive data protection?