Posts

Showing posts from April, 2019

The Most Useful Web Services to Optimize Your Privacy Online

Image
There’s something to be said for fighting fire with fire, especially when you don’t have any other choice. In this case, the fire being fought is the compromising of your personal information on the internet. Of course, there’s a (sort of) surefire way to ensure that your private information isn’t tracked, collected, bought, sold, and otherwise aggregated and traded online: Not going on the internet. Of course, that’s not feasible for most people. That’s where fire to fight fire becomes necessary: Using web services and information on the internet against the internet sites that are collecting and trading your private information. These strategies range from passive protection to learning how to remove personal information from Google to going in and opting out of the data broker sites. Here are some of the best web services to ensure that your (often very ) private information remains private. Have I Been Pwned? Email is one of the primary ways in which personal inf

What Doxxing Is and How to Avoid It

Image
It’s hard to describe to members of the pre-internet generation how different life was before the World Wide Web changed everything. The ease of use and ubiquity of search engines alone represents an indescribable paradigm shift from a time when information on virtually anything you wanted to know about was at your fingertips.  Unfortunately, as is so often the case, the brave, relatively new world of information access has a downside. One of the biggest drawbacks of the information age is that it tends not to be picky about the information that’s shared, including information about you. And once shared, it’s hard to remove personal information from Google that’s aggregated by data brokers and tracked by search engines. Which brings us to the hateful world of “doxxing.” What Is Doxxing? There’s a common warning given to those interacting with strangers on the internet on social media, chat sites, dating sites, and the like: “Be careful, they could be anyone!” That s

Common Types of Cyberattacks and How to Avoid Them

Image
Cybercrime is proving an increasingly costly drain on the global economy. Research indicates that cyber attacks could cost companies globally about $5.2 trillion over the next five years—that’s more than a trillion dollars a year. Unfortunately, when there’s that much money at stake, there’s going to be a criminal population that’s both enthusiastic and innovative about fighting for a piece of those funds. The result of that criminal innovation is a whole selection of strategies for fleecing the unsuspecting of their money or information that can parlayed into money, just a few of which are featured here. Thankfully, there are strategies, like learning how to remove personal information from Google , that anyone can leverage to protect themselves against cyber predators. Password Attacks Password attacks are one of the oldest and least sophisticated, but still often effective, form of hacking and cyber-theft. The attacks are often perpetrated in two ways: targeted a