The phenomenon of people using their smartphone or tablet to check-in to places has become extremely popular in the recent years. Location-based social networks such as Foursquare, Twitter, and Facebook allow users to easily announce where they are and who they are with. So, why do people check-in, and what are the potential risks of announcing your whereabouts to the rest of the world?
Continue Reading… Checking-In: Are You Giving Away Too Much Information?
A few clicks of the mouse, and your webcam is activated and ready to be used. But have you considered the possibility that someone else could be watching you through your own webcam? The thought of this probably sends chills down your spine, and it should, as this is very real- and extremely creepy.
Continue Reading Are You Being Watched Through Your Webcam?
With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of being exposed to many online dangers becomes very real. Here in our infographic, we address some of the online dangers kids could face, ways they can be exposed, and a few steps parents can take to keep their kids safe.
Continue Reading… Protecting Kids Online
Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen?
There are some preemptive measures you can take to make the loss less traumatic in the event your device does get stolen.
Continue Reading… What to Do When Your Device is Stolen
While social media sites such as Facebook and Twitter make it easy to share things with your friends, they also make it easy to log in to various services and applications, too. As authentication brokers, Facebook and Twitter let users use their account credentials to sign into third-party sites. To do so, the user has to give permission for those sites to access their profile data.
Facebook is a full-blown apps ecosystem. You may have added an app to take advantage of a promotion or contest, played a game, or added new functionality such as music streaming. In most cases, it just means the app developer has access to some of your profile data. In the worst-case scenario, a malicious developer behind the service can use your account to send out spam.
Continue Reading… What Apps Have Access to Your Facebook and Twitter?