Smile, the police are watching you on camera

You've probably noticed the CCTV cameras sprouting up everywhere, on city streets and in public places. Yes, these insidious Closed-Circuit Television (CCTV) cameras have become the new police in our lives. Since the development of technology, police departments around the world are finding new ways to find criminals, but now we are all suspects.

Continue ReadingSmile, the police are watching you on camera

3 types of EMF radiation you need to keep away

Our home is the most precious material asset in our life. This means that many of us put a lot of effort into making our homes pleasant and comfortable. Many homeowners, however, fail to realise that comfort does not only come from the best furniture or architectural innovation. There are a few invisible factors, silent thieves, as I like to call them, that affect the health of your home. Electromagnetic radiation is one of these factors that can seriously affect our health and wellbeing. Fortunately, homeowners have caught onto this and are growing more conscious of EMF protection.

Continue Reading3 types of EMF radiation you need to keep away

10 years of lessons: Thank you Edward

Edward Snowden coined the topic of digital PRVCY because he believes that everyone deserves a separation between their private life and their right to intimacy. Snowden has been warning about the rapid advances in surveillance technology since 2013, ten years ago, and today we want to commemorate his commitment to digital privacy.

Continue Reading10 years of lessons: Thank you Edward

Exploring SMAT: A Social Media Analysis Toolkit for Activists, Journalists, and Researchers

In 2020, Mozilla Firefox announced the Social Media Analysis Toolkit (SMAT), which addresses the challenges of manipulated online discourse. Co-developed by Mozilla Fellow Emmi Bevensee, it is a free, easy-to-use and open-source tool designed to analyze digital conversations. SMAT is designed to help activists, journalists, researchers and other non-profit organizations with censorship by analyzing and visualizing harmful online trends such as hate, misinformation and disinformation.

Continue ReadingExploring SMAT: A Social Media Analysis Toolkit for Activists, Journalists, and Researchers

What’s Wrong with Microsoft Teams?

Despite Microsoft Teams having more than 270 million active daily users in 2022, highly regulated industries and government organisations are still reluctant to deploy Teams or restrict its use due to information security concerns. Yes, if a government agency doesn't trust an app, website or service, neither should you.

Continue ReadingWhat’s Wrong with Microsoft Teams?

Chatbots and data protection – the effects

Chatbots are those neat little pop-up windows that websites install to help you navigate. Whether we're looking for customer service, need help with shopping or just want to have a friendly chat, chatbots are there, smiling and offering quick answers and efficient solutions. In this article, we'll dive into the fascinating world of chatbot development and uncover the underlying mechanisms that enable their ability to understand, process and respond to human language, as well as the digital risks involved.

Continue ReadingChatbots and data protection – the effects

The Power of Blockchain Technology: A Comprehensive Exploration

In the ever-evolving landscape of technology, one term has become increasingly synonymous with innovation, security, and transparency - blockchain. Originally devised as the underlying technology for cryptocurrencies like Bitcoin, blockchain has transcended its initial application, showing promise in revolutionizing various industries. In this comprehensive guide, we'll unravel the intricacies of blockchain technology, exploring its core principles, applications, and the transformative impact it has on our digital future.

Continue ReadingThe Power of Blockchain Technology: A Comprehensive Exploration
Read more about the article 9 ways how identity theft works
Cyber thief, hacker, wearing a man mask and shaking hand with businessmano on computer laptop. Cyber security and crime concept. Vector illustration of flat design people characters.

9 ways how identity theft works

Unfortunately, this increase in online interactions has also led to a rise in identity theft, a malicious act in which criminals steal personal information to exploit or defraud unsuspecting victims. Like other regions, Europe has had its share of identity theft, which has caused countless people financial loss and emotional distress.

Continue Reading9 ways how identity theft works