Thanks to The Zebra for this infographic.Continue Reading →
A lot of very specific location information is being collected about you, me, and every other smartphone user. The image at left shows everywhere I have been in the last four years, courtesy of Google location services. If you would like to find out what is being collected about you, and how to make it stop, the last article and this article will ...Continue Reading →
A lot of very specific location information is being collected about you, me, and every other smartphone user. The image at left shows everywhere I have been in the last four years, courtesy of Google location services. If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help. Today ...Continue Reading →
An very cool. detailed, and facinating look at how technology is changing and breaking the spy game from foreignpolicy.com. Worth the read.
The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The winners will be those who break the old rules of the spy ...Continue Reading →
The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones. Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.
Stalkerware is not limited to Android phones. It can be installed ...Continue Reading →
Your web browser collects data about you and shares it with the websites you visit. Your smartphone collects a ton of data about you and some of it goes to the carrier, but most of it is sold to data brokers by the developers of all those “free” apps you installed. You car is collecting data about you too. Where you go, how ...Continue Reading →
The climate around mobile app security is heating up.
Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.
In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.
Starting in December of 2017, TimeHop was ...Continue Reading →
It’s something that we hear a lot about – mobile devices have become an integral part of our society. Can you remember the last time that you switched your phone off for the weekend? Can you even imagine not having your phone with you all the time? If you’re like most people, the idea is ludicrous. We keep everything on our phones.
It’s convenient for us – you don’t have to boot ...Continue Reading →
Years ago, when I was in school, they tried to give us the metric system, but we rejected it. For those of you that need help with conversion, there are ...Continue Reading →
March 31 is World Backup Day. Monday is April Fool’s Day. Coincidence? I think not. I you are one of the hold-outs who is going to get around to it someday, today is your chance.
Google’s Project Zero researchers have revealed a “high ...Continue Reading →