Tag: Computing Security

Beware, travel apps are hungry for your data – here’s how to protect your privacy

As you’re getting ready to hit the beach or travel to the Paris Olympics, beware: travel applications are among the most data-hungry and privacy-unfriendly apps. Cybersecurity experts at NordVPN, one of the best VPN providers on the market, have found the likes of Booking, Airbnb, and FlightRadar24 request some of…

Read More

Brave’s user base exploded in May, but it can still do more

Brave might not be the most well-known web browser out there, but it’s certainly making a splash in a sphere dominated by the likes of the data-hungry Google Chrome. In fact, the browser recently revealed that it recorded a record number of new users in May—which begs the question: why?…

Read More

Windows Recall sounds like a privacy nightmare – here’s why I’m worried

When I first heard about Recall, I immediately buried my face in my hands. I never thought I’d see such a glaring target be created by Microsoft, never mind it being marketed as a feature. If you haven’t read about it yet, Recall is an AI feature coming to Windows…

Read More

Independent auditors confirm top VPN’s privacy claims

Industry-leading auditing firm Deloitte Romania have verified that CyberGhost VPN takes care of your data as it should and states to do so. The audit takes a deep dive into the provider’s system and privacy infrastructure while verifying that it never logs any of your identifiable information as stated in…

Read More

Proton Mail hands data to police again – is it still safe for activists?

Last week’s news of Proton Mail disclosing a user’s recovery email to the Spanish police that was used to identify and arrest a pro-Catalan protester is likely to have unsettled activists in Europe and beyond.  Proton Mail is an encrypted and secure email app and is hugely popular among journalists…

Read More

It’s been a bad week for public cybersecurity

It has been quite frankly a terrible week for those across the healthcare sector. Multiple different healthcare organizations have suffered ransomware attacks, each with widespread ramifications. This occurs when attackers lock up sensitive data and hold it hostage until the organization pays a ransom.  The U.S. Department of Health and…

Read More