Here is an infographic from Venture Beat.
Continue Reading →
In our last three posts, we dissected the data collection program on one of the biggest Internet companies, the King of the Internet, Google. Today we are going to provide you with a small set of options you can use to reduce and sometimes eliminate your exposure to data collection, and increase your privacy while online. These solutions will work well not just against Google, but also against the data collection ...Continue Reading →
Now that I know everything about you, maybe I can predict what you are likely to do in the future. In the first two parts of this report, we looked at Google and the many products and services that collect information about you, and just what kind of details are included in that informational trove. Today we will see what that information can do.
Whether you call it bots, AI (artificial intelligence), ...Continue Reading →
What would you think about one company knowing nearly everything about you? After today’s article, you will have a fairly complete understanding about just how much of your information is collected by one company – Google.
Let’s start by looking at many popular Google products and services and just what information they collect about their users.
Spying, intelligence gathering, surveillance, reconnaissance, eavesdropping, tracking – the Internet has made these activities much easier than they used to be. The NSA, CIA, Russia’s Fancy Bear, China, North Korea – which organization is gathering more information about more people than probably any other. While your information is unlikely (hopefully) to be in the NSA, CIA, or other governmental databases, a lot of information about you and me are certainly in ...Continue Reading →
09/14/2018 02:19 PM EDT
NCCIC warns users to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a subject line, attachments, ...Continue Reading →
We know that the US government is spying on us. Just how deep the surveillance goes is a question that is hard to answer. If you are one of those people who thinks this surveillance is OK because you “have nothing to hide,” I suppose you could skip this article. But here’s my question – why do you get upset when your identity is stolen by a cyber-criminal, but yet you are unmoved when your own government does the same ...Continue Reading →
I’ve been writing this blog long enough that I receive regular submissions for guest content, infographics and other sort of suggestions for article topics. As long as the submissions are legitimate and on topic, I am generally happy to post them. My next post is one of those times. My efforts at verifying the source has been an interesting ...Continue Reading →
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.
87% of companies experienced an ...Continue Reading →