Incognito mode Q&A
As you move around the Internet, it is almost impossible not to leave any digital footprints. And generally speaking, being followed on the Internet is not okay with most people.
256 articles
As you move around the Internet, it is almost impossible not to leave any digital footprints. And generally speaking, being followed on the Internet is not okay with most people.
A new buzzword is echoing all over the world, and it consists of only three letters: V, P, and N. VPN. Do you know what a VPN is? If not,
What do you suppose the click-through rate is for links received by men in dating app messages from attractive women? Take a guess — 1%? 5%? 15%? According to research
Considering the sweeping regulations and laws meant to safeguard children’s privacy in particular, you might think electronic devices and connected toys for kids would be particularly safe and secure. We
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist:
In the face of malware, Android has a very good defense mechanism — the app permissions system. This system defines a set of actions an app is allowed (or not
Hi, my name is Serge, and I just realized that I have been an active Internet user for 20 years. Seriously, this year I should celebrate an anniversary, but instead
Meitu, the ‘anime-makeover’ app is doing something that users perhaps didn’t realize they’d signed up to. It’s been found to be harvesting all sorts of data on users, including your location, reading,
Have you ever visited Amazon.com only to find items you’d forgotten in your shopping cart? Returned to Hulu and found you were already logged in? Have you ever noticed how
So, what is a private messenger? Many would just say that a messaging app is private if the messages it conveys are encrypted. But in reality, messaging privacy is a
Public awareness of — and wariness about — Web privacy continues to grow. That should come as no surprise: These days, pervasive cybertracking affects everyone. In this article, the last
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
A recent survey of 4,831 active social network users, conducted by Kaspersky Lab in 12 countries, reveals that an overwhelming majority (78%) of respondents considered quitting their social networks —
An old-school habit, labelling the back of photos, has transitioned into something more appropriate for the digital age. These days, one needn’t scribble comments on a photo; your camera, an
Even people who avoid online services can find their lives affected by them. For example, one morning you might wake up to find your usually quiet local street has become