How to host private videoconferences
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
267 articles
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
The new school year is in session. Here are some tips for keeping your kids safe both on their devices and online.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
Detailed tips for those who want to make money from streaming without feeding the trolls.
Here’s how to set up Threads to make your profile both private and secure.
How to secure chats on your phone, and why encryption alone is not enough
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Alternatives to Google Chrome that take data privacy more seriously.
What happens to your digital assets after you die, and how to make sure they fall into the right hands before you do.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
How to reliably protect your cryptocurrency given the numerous fraud schemes and lack of protection through government regulation.
Could someone be viewing your private photos while your device is being repaired?
How to store and process personally identifiable information in a company with minimum risks.
Do you edit images in Windows 11 or on Google Pixel? Due to a developer error, hidden information in cropped or edited pictures can be recovered.
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
Have you ever come across the words Secure DNS or Private DNS in your smartphone settings and security apps? It’s best to keep this feature enabled – it has many advantages.