Every time you install an App on your smart phone, it asks you for access permissions. Most applications want to know where you are, to have a snoop at your contacts and even browse and access your private files. With the increasing use of smart phones, we all got used to this as being the natural order of things. But how aware are we really to that background activity of data collecting by apps in our phone?
YOUR LOCATION HAS BEEN SHARED 5,398 TIMES IN LAST 14 DAYS A new study from the University of Carnegie Mellon is trying to answer that question while shedding some light on the constant spying

YOUR LOCATION HAS BEEN SHARED 5,398 TIMES IN LAST 14 DAYS

Every time you install an App on your smart phone, it asks you for access permissions. Most applications want to

This week’s big tech headlines from the EU was all about Google being accused by Brussels of illegally abusing its dominance of the internet search market in Europe, a step that ultimately could force it to change its business model fundamentally and pay hefty fines. But in the shadow of this hot development, evolves a much bigger European case, one that could have huge implications on all EU member states and the privacy of their citizens.

UK Mass Surveillance Is Facing a Ruling From Europe's Human Rights Court

The European Court of Human Rights that will soon decide whether British mass surveillance is lawful, as an alliance of human rights organizations

UK Mass Surveillance Is Facing a Ruling From Europe's Human Rights Court

This week’s big tech headlines from the EU was all about Google being accused by Brussels of illegally abusing

In a recent interview with HBO's John Oliver, Edward Snowden recommended using passphrases rather than passwords. It seems like a logical step but it's not as simple as it sounds.

A Passphrase isn't enough

Complex passwords are a must to protect against the typical attacks that threaten your data.

There are a number of methods that hackers can use to get your password. Guessing is one, with enough knowledge of the person, background information or if the user has been lazy and used 12345678 or some other lazy combination. Any complexity should make guessing almost impossible. Bruteforce or dictionary attacks are also a typical

A 'Passphrase' isn't enough

In a recent interview with HBO's John Oliver, Edward Snowden recommended using passphrases rather than passwords. It seems like a

The use of older encryption standards and infastructure is one of the major threats identified in Websense Inc.'s 2015 threat report. OpenSSL has a number of functions when connecting to websites. It's important for logging into websites and buying online as it's meant to secure the user through encryption but it has numerous flaws.

Threat Report 2015

The biggest threat to rock OpenSSL recently was the heartbleed exploit that exposed the vulnerability of many of the internets major websites. Heartbleed affected over 500,000 websites including big names such as Facebook, Tumblr and Instagram. If exploited it would make passwords, usernames, credit

OpenSSL is leaving you vulnerable

The use of older encryption standards and infastructure is one of the major threats identified in Websense Inc.'s 2015

One of the most common arguments you hear when you talk to people about technological invasion of privacy is: “I don’t care; I’ve got nothing to hide”. While this may seem true to most people out there it actually rarely is

everybody’s got something to hide – your sexual preferences, your surfing habits, your phone location and an abundance of other information can reveal almost everything about you. And even if you've got nothing to hide, you may find realise at some point in your life that actually privacy was not such a bad idea.

Take for example

Do you really have nothing to hide?

One of the most common arguments you hear when you talk to people about technological invasion of privacy is: “I