Home » mobile security » Page 3

mobile security

What is Privacy? How Does Online Privacy Work?

When I first started using the Internet back in late 1994, I thought that everything I did was invisible unless I signed my name to it. As my understanding grew, this quickly became a shattered illusion for me. What is privacy online now? It’s a complicated series of interlocking services, passwords, and networks that can make or break your personal privacy.

I’m going to look at what privacy is today, how you can gain more privacy, and show you some tools that will help.
Read More »What is Privacy? How Does Online Privacy Work?

Basic Mobile Data Security in a Highly Connected World

The world of information security use to focus almost exclusively on one main thing: Desktop computers. Then came laptops, smartphones, tablets, smartwatches, and the Internet of …everything fast approaches. Welcome to the new world of mobile data security!

Your business could suffer severe information damages from just one smartphone being lost. People keep their whole lives on these devices, and you can be sure that their work is on them. Knowing your risks, and some solutions, can be a great first step. This article will look at both of these aspects so that you can better control your mobile data risks.
Read More »Basic Mobile Data Security in a Highly Connected World

How to Unblock Twitter: End 140 Character Censorship!

Twitter is many things to many people. It can be used to stay in touch with friends. It can be used to share jokes. It can be used for video. It can be used for pornography. And it can be used to share news stories and current events. These last two uses are why people need to unblock Twitter as censorship happens.

This article is going to look at censorship and blocking issues with Twitter, and offer you real solutions on how to get around it.
Read More »How to Unblock Twitter: End 140 Character Censorship!

Data Retention: Australia’s New Laws Come into Effect

  • News
  • 4 min read

As of October 13, 2015, Australia has passed into law some of the most restrictive data retention laws in the Western world. If you look at them, and understand what they mean, you’ll wonder if this is the type of law coming out of repressive regimes like China, or Syria.

The cost to ISPs could be quite high, causing them to have to raise their prices. The cost to consumers could also be high as any time a large amount of data is stored needlessly, someone comes along and hacks it. Despite the high costs, the retention laws can be easily and cheaply circumvented. We’ll look at all of this now.
Read More »Data Retention: Australia’s New Laws Come into Effect

What is Cyberbullying? How Can We Protect Our Kids from Cyberbullying?

Parents everywhere are all asking the same questions: What is cyberbullying? What can we do to protect our kids from this? While you may never be able to stop your children from being cyberbullied completely, you can certain do plenty to better protect them, and better educate them.

This will all tie in together with your overall cybersecurity plan, and how you will stay safe online in general. If you’re over the age of 18 the typical term used here is “cyberstalking,” and the advice in this article can apply to you just as readily as it will to someone under the age of 18.
Read More »What is Cyberbullying? How Can We Protect Our Kids from Cyberbullying?

iPad Security: Protect your Mobile Device and Information

Taking care of your iPad means looking into iPad security tools, tactics, and apps. While you may feel that the things on your iPad are worthless, this doesn’t mean that someone won’t still try and hack your iPad.

If you’re hacked this could result in the loss of passwords, banking information, personal data, and your device no longer working. Why risk it when these iPad security tools and tips are so easy to follow? Keep reading and learn how to protect your iPad!Read More »iPad Security: Protect your Mobile Device and Information

BYOD and Mobile Device Risks for your Business

The movement for BYOD, and the flexibility being afforded to workers to use mobile devices of their own choosing, can be freeing for some. For others, such as the cybersecurity conscious, it can be a bit of a nightmare of all new mobile device risks to deal with.

Common precautions that were once on every device in your network may not be taken anymore. Here are a few rules you should institute for BYOD devices so that you can minimise the risks associated with allowing mobile devices into your workflow.Read More »BYOD and Mobile Device Risks for your Business

The New Facebook Privacy Policy Change: You’re Being Followed

  • News
  • 4 min read

You won’t catch me on Facebook, but those which do use the big blue lowercase f have even more privacy concerns that they should be aware of. I know that being privacy aware isn’t a big concern for many people out there who share sexts on a daily basis and post their every thought somewhere online. For those who are more privacy aware, read on to find out more about Facebook privacy as it is today.
Read More »The New Facebook Privacy Policy Change: You’re Being Followed