Online Privacy

This section deals with VPNs, hacking, data ownership and other similar topics. Don't see what you want? Check out Security.




As organizations tap into big data and rush to integrate intelligence, we must start to put in place regulation so that technology is a...


When it comes to free internet services, that often means that you’re paying by providing data that may be far more valuable than the fees...


To think we’ll be able to completely avoid smart devices to protect our privacy seems far-fetched. So gather as much information as you can...


Recent VPNpro research uncovers concern over the common use of malicious apps, including VPN apps, largely due to the fact that Google Play...


With large numbers and cases of security breaches affecting the world, it's obvious that we need to find more secure solutions other than...


Cryptography is a game that everyone has to play — and it’s still evolving in the age of quantum computing and AI.


What's happening in the field of biometrics? Some people would say: not much. Some others, who are closer to the industry, would say a lot...


In truth, encryption is rooted in practices that date back thousands of years. The technology and codes have changed, but some of the...


Modern cybercriminals are becoming more aggressive every day, but they're not the only prying eyes trying to spy on your data


Learn the truth of what actually happens in those massive data breaches that claim millions, even billions, of user IDs were sucked into...


Data privacy advocates succeeded in pushing for regulations in the EU in the form of GDPR. On the other side of the Atlantic, individual...


One of the major cyber security predictions for 2020 is that there will be a rise in ransomware attacks; not just your average ransomware...


Hackers attack a computer every 39 seconds, but what's almost as surprising is the number of people who believe that they’ll never be...


Phishing scams are rapidly evolving both in terms of the tools being used and the cleverness with which they are being designed. But there...


Some believe facial features or the way you type, are more secure than a password, but there are still millions of data breaches and...


Learn the privacy benefits of Skype and also the privacy concerns related to it.


AI and ML are also powerful forces in disrupting cybercrime, protect enterprises, and safeguard data against breaches and exploits. What...


It’s time to have a look at agility and security methods, their strength, weaknesses and historical uses, and the newer approaches that...


Cloud security is a serious issue; how has the cloud changed the cybersecurity game?