Privacy

Smartphone displaying social media apps over a keyboard.

3 Ways To Protect Your Privacy On Facebook

By Nick Duley. As technology is becoming an increasing part of our lives. It’s important to protect our privacy and...
A thief sneaking away with a credit card from a laptop.

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Word cloud highlighting key terms related to cybersecurity.

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
Magnifying glass inspecting binary code on a mobile device.

Decrypting the encryption debate.

by Kate Dinnison Encryption is essentially the process of turning information into code that prevents snoops, criminals, and spies from...
A vintage typewriter with round keys on a wooden surface.

Hipster counter-espionage?

By Philip Smedegaard It is now three years ago that the Russian Federal Protection Service (FSO) (in charge of protecting...
A hacker stealing personal information from a computer user.

Phishing and the cost of your information

By Aqsa Hussain. Do you remember receiving that email some time ago mentioning ‘Here is an invoice to the flight...