902, 2018

Disable Windows 10’s intrusive settings

By |February 9, 2018|Categories: Windows|Tags: , , , , , , |

Windows 10 is undoubtedly Microsoft’s most accepted operating system since Windows XP. But that doesn’t make it faultless, many users have been complaining about the intrusive privacy settings the operating system enables by default. To reclaim your privacy, follow these tips on turning off its intrusive settings Turn personalized advertising [...]

2901, 2018

Why is Skype’s new feature so important

By |January 29, 2018|Categories: VoIP|Tags: , , , , , , , , |

With more targeted attacks on social networking services than ever, private conversations with your business partners can become public information. To prevent this, Skype has released a new feature that ensures complete privacy by encrypting all types of communication. Here are some of the features. Benefits of using Private Conversations [...]

901, 2018

Think before saving logins to your browser

By |January 9, 2018|Categories: Security|Tags: , , , , , , , , |

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your [...]

612, 2017

Cybersecurity Essentials: VPN

By |December 6, 2017|Categories: Security|Tags: , , , , , , , |

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, [...]

307, 2017

Google ridding MR from search results

By |July 3, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual's medical records were [...]

1104, 2017

Did Microsoft commit a security breach?

By |April 11, 2017|Categories: Office|Tags: , , , , |

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission. These include hundreds of users who might be unaware [...]

2209, 2016

Think your Google history is gone for good?

By |September 22, 2016|Categories: Google|Tags: , , , , , , , , , , |

Like breaking up with past lovers, when deleting something from our browsing history, we all have that lingering feeling that it’s never really gone. Some may even suspect that multinational tech giants such as Google might have been keeping tabs on all the searches you’ve made -- and they’re right. [...]

1802, 2016

Tips on Windows 10 privacy protection

By |February 18, 2016|Categories: Windows|Tags: , , , , , , , , |

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here [...]

1712, 2015

Google and the art of safe mobile browsing

By |December 17, 2015|Categories: Security|Tags: , , , , , , |

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order [...]

Go to Top