Employee monitoring: Is ‘bossware’ right for your company?
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
Browsing category
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
Your smart speaker is designed to listen, but could it be eavesdropping too?
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home.
Both Tor and a VPN can greatly help you keep prying eyes away from your online life, but they’re also two very different beasts. Which suits your needs better?
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your worries to rest.
Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted code within a single process. Security researchers at Oxeye found CVE-2022-36067 in August 2022, a major vulnerability in vm2 with a CVSS score of 10 that should notify all vm2 users due to its potential […]
As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?
Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the key unlocking your phone. What’s the good and the bad of using biometric traits for authentication?
Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services.
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
Digital fiddling somehow got mixed up in a real war
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
Why would a tax agency contractor’s privacy policy mention collecting information about my Facebook friends?
The trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal data