The internet currently accesses about 15 zettabytes of data, and is growing at a rate of 70 terabytes per second. It is an admittedly leaky vessel, and content is constantly going offline to wind up lost forever.
As digital technologies facilitate the growth of both new and incumbent organisations, we have started to see the darker sides of the digital economy unravel. In recent years, many unethical business practices have been exposed, including the capture and use of consumers’ data, anticompetitive activities and covert social experiments. But what do young people who grew up with the internet think ab...[Read More]
A survey found that consumers’ were very concerned about the protection of their data. As much as 64% of the participants know someone personally whose personal data has been misused. Unwanted marketing was common, suggesting that contact information which was meant to be kept private, had been shared with others.
Research has shown that when computers were fitted with proximity sensors (which facilitate online security by automatically logging users out when they move away from the machine) users began placing cups over the sensors to disable them.
WhatsApp may be expiring for some users, but those folks without worries on that front still have something to worry about. Certain versions of the app are vulnerable to an exploit that installs spyware, developed by Israeli outfit NSO Group according to reports. And the nasty part is the penetration method -- WhatsApp can be infected with nothing more than a missed call.
WhatsApp is reportedly testing a feature that’ll block users from taking screen shots in-app to increase security for users and stop people sharing private conversations.
You might feel like you missed the VPN hype that spiked in the pre-local-Netflix years, so what even is a VPN and why do you need one?
Despite what every spy movie in the past 30 years would have you think, fingerprint and face scanners used to unlock your smartphone or other devices aren’t nearly as secure as they’re made out to be. While it’s not great if your password is made public in a data breach, at least you can easily change it. If the scan of your fingerprint or face – known as “biometric template data” – is revealed...[Read More]
When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devi...[Read More]
When the ten year challenge began doing the rounds on social media, people rushed to post profile pictures of themselves from 2009, side by side with one from 2019, to highlight how much they had changed (or not) in the meantime. It is estimated that more than 5.2m social media users participated in this challenge.