Data collection in Android and iOS

It’s worth being aware that our smartphones are among the most extensive data-collecting devices. According to research by Trinity College, the University of Dublin, and to the surprise of many, Android devices collect around 20 times as much data about the user as iPhones. The devices surveyed interacted with Google and Apple about every four and a half minutes. The numbers show how difficult, if not impossible, it is to …

Learn more →

According to Google, two-factor identification works well

The world of cybersecurity is constantly changing and evolving, with innovations always appearing. One of the latest initiatives to protect us from phishing and other forms of cybercrime is two-factor identification (2FA), which can be implemented in many ways and might be something you want to explore. What does two-factor identification (2FA) mean? Two-factor identification is a security measure that adds an extra step to the login process. You might …

Learn more →

One browser is no longer enough to keep you safe online

Many free and paid browsers are available, making it difficult to determine which one will keep you the safest. One combination of effective browsers is Firefox and Tor. This browser combination can help you stay more anonymous online by encrypting your information, bouncing your connection around through different servers set up for this purpose, and restricting access to specific websites. How to strengthen your online security? We don’t have to …

Learn more →

Google two-step sign-in tricks

2FA is a security measure that verifies your identity when logging into an account by requiring the use of two different types of authentication. This article is about 2-factor authentication which we use for protecting our accounts from unauthorized access. 2FA is convenient and secure. Google has now enabled 2FA by default for all accounts. We’ll show you how to use this handy protection conveniently and prevent being locked out …

Learn more →

Use cloud encryption so no one else can read your files

It has never been a better time to take advantage of the cloud. There are so many benefits to going paperless, from accessing your data anywhere to being environmentally friendly. But before you start saving all your important documents and files up in the cloud, you need to know how to keep them as private as possible. In this article, find out what E2E encryption is and why it’s essential …

Learn more →

How hackers work

As hackers have become more sophisticated and better-funded, many of us find ourselves asking how we can defend ourselves against them. This is a question that will only grow in urgency over time. In this blog post, we want to give you an overview of how hackers work. Not just to show you what they’re capable of but also to help you understand what you can do better to protect …

Learn more →

The best U2F apps for iOS, Android, and Windows Phone

Biometrics and embedded security are becoming more and more widespread in the world of IT and software. Apple, Google, and Microsoft have all integrated biometric technologies into their devices. But what do you do if you don’t own one of these devices? Or if you travel a lot and want to use your U2F app on different computers? What is U2F? The U2F app will enable you to log in …

Learn more →

Google warns about QR code fraud

The Barcode Scanner software, which can be downloaded for Android, was initially designed to scan barcodes and QR codes. Still, after a faulty update, the app was used as an unsolicited extra to help download viruses. The update, which has since been removed, displayed ads after scanning the code and prompted users to install other software on their phones. It is unknown how many people have installed the faulty update, …

Learn more →