Privacy

Role-Based Access Control – The Basics

Business leaders tend to place a lot of faith in their intuition and judgment. Inherently, they trust the people hired to have the best interest of the company and believe proper care will be taken regarding security. This isn’t always the case. According to IBM, “Insider threats account for 60 percent of cyberattacks, and they…

Chrome 83 Offers Improved Mobile Browsing, New Security and Privacy Controls

Google published Chrome 83 this week to the stable channel with patches for a total of 38 bugs, enhanced Safe Browsing support, and revised security and privacy controls. The newly introduced Enhanced Safe Browsing protection in Chrome is intended to provide users with a higher degree of security while browsing the web, by increasing protection…

Why Endpoint Protection is Vital

Endpoint defense is a critical part of every robust security programme. Often known as protection for endpoints. However, both words apply to the same protection solution that protects network endpoints from: Attacks Zero-day exploits Human error Data leaks Why is the endpoint security critical It is a common misconception that anti-virus programs can avoid targeted…

The Name of Facebook Sues over fraudulent domains

On Thursday, Mr Facebook declared its refusal to provide details on a number of fields that were impersonating the social media company and its services in an action against the domain registrar Namecheap and its privacy service Whoisguard. Facebook notes that it actively scans for domain names and applications that contravene its trademarks, and that…

Top Message Locker Applications to Hide Mobile Text Messages

In the modern world of advanced technology, the contact system revolves around messaging applications. Many people around the world use messaging apps such as WhatsApp Messenger, Facebook Messenger, Hike, WeChat, etc. Nonetheless, for some reasons, the default message app installed on every phone is much less used. One of the principal reason is that the…

How to Hide Android Phone Apps

Hello readers, we’ll discuss an interesting topic today and that is how you can hide apps on your android phone you don’t want others to know about. Sometimes you can use banking apps that require more protection or dating applications without your girlfriend’s permission. Just imagine what if she takes your phone and finds you…

FBI Asks Apple for Saudi Shooting Suspect Phone Data

This week, the FBI requested Apple to help extract data from iPhones belonging to the Saudi aviation student who said that three mariners fatally shot at a US naval base in Florida last month. Investigators tried to access both devices–iPhone 7 and iPhone 5 of the Royal Saudi Air Force’s 21-year-old Mohammed Alshamrani–but were incapable…

The Dark Web Hits Your Mobile Phone

Deep internet and privacy enthusiasts have a lot to rejoice at as the Tor Project announces its popular Android Tor Browser. Tor Project Members claim that the browser is now in Alpha and can be installed first via Orbot. Users may start accessing the Dark Web via their mobile device by going to the Google…

Google: 80% of Android Apps Default Encrypt Traffic

Google has shared some information on the adoption of TLS by Android apps, and significant progress seems to have been made over the last two years. According to Google, 80% of Android apps now aim to encode traffic and, for applications developed for the most recent versions of the operating system, the percentage is higher….

Top 2019 Antivirus Applications For your Android Smartphone

There’s no real sense of losing your mobile telephone, whether it’s down on the back of the sofa or at night or not. These days our smartphones are all to us, or at least they can be. Debit cards, personal computers, dating simulators, entertainment devices without touch. And you would not leave your smartphone in…

  • 1
  • 2