Data collection in Android and iOS

It’s worth being aware that our smartphones are among the most extensive data-collecting devices. According to research by Trinity College, the University of Dublin, and to the surprise of many, Android devices collect around 20 times as much data about the user as iPhones. The devices surveyed interacted with Google and Apple about every four and a half minutes. The numbers show how difficult, if not impossible, it is to …

Learn more →

The FBI does have access to many messengers

It can be hard to know who to trust these days, even for your government. There are a lot of programs available now that allow you to communicate privately, with the promise that they will keep your messages safe. However, it’s not always possible to tell if these companies are trustworthy or if they’re providing an adequate level of security. In this article, you’ll find out how the FBI has …

Learn more →

A critical vulnerability in the most widely used server software

A critical vulnerability has been found in the most widely used server software that could allow malware to be introduced to many servers available on the Internet. This type of attack is known as remote code execution, and it has already been used in attacks against WordPress installations, for example. The case A vulnerability has been found in the popular Apache server software that could allow malware to be introduced …

Learn more →

Use cloud encryption so no one else can read your files

It has never been a better time to take advantage of the cloud. There are so many benefits to going paperless, from accessing your data anywhere to being environmentally friendly. But before you start saving all your important documents and files up in the cloud, you need to know how to keep them as private as possible. In this article, find out what E2E encryption is and why it’s essential …

Learn more →

The best U2F apps for iOS, Android, and Windows Phone

Biometrics and embedded security are becoming more and more widespread in the world of IT and software. Apple, Google, and Microsoft have all integrated biometric technologies into their devices. But what do you do if you don’t own one of these devices? Or if you travel a lot and want to use your U2F app on different computers? What is U2F? The U2F app will enable you to log in …

Learn more →