Many Android applications collect a huge amount of user data for various purposes, without always specifically explaining why. Vocativ checked 25 of the most popular Android apps in the Google Play store, counting the number of permissions they require and looking at the kind of data they can collect once the users agrees to them, often without even reading them. In fact, Vocativ claims that some Android apps may be […]
Possibly the most secure of all available operating systems available today is Tails, an abbreviation for The Amnesiac Incognito Live System. If you are concerned about privacy of your email messages and also the ability to visit web sites without being tracked, you should become familiar with Tails. Luckily, that is easy to do. It boots on almost any Windows computer from a USB drive, DVD drive, or a SecureDigital […]
Privacy Protector 1.8 for Macintosh Securely Gets Rid of Files and Data that may Invade Your Privacy
Privacy Protector is a powerful and effective way to securely get rid of files and data that may invade your privacy and act as potential threats to your Mac. You can use this app to remove a host of sensitive information that can be used to track your activities. Specifically, it clears your cache files, cookies, browsing history, and more, all at the click of a button. Privacy Protector uses […]
This one works. I replaced an old MacBook Air about a year ago and purchased a new version of the same thing only with a bigger hard drive, a faster processor, and a better display. The old laptop sat on the shelf for a while until I started pricing out a new security camera to keep en eye on the house when I am away. Wait a minute, I already had […]
Amnesty International has released a program that can spot spying software used by governments to monitor activists and political opponents. Amnesty said many governments used sophisticated spying tools that could grab images from webcams or listen via microphones to monitor people. It wants to see more regulation of the spying software used by governments.
An interesting article in Wired describes how the NSA, researchers in Israel, and possibly others steal data from computers not connected to the Internet. The method allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer by using radio signals generated and transmitted by the computer and received by a mobile phone. You can read the article about “AirHopper” at http://www.wired.com/2014/11/airhopper-hack.