Air India data breach exposes personal information of 4.5 million people

Around four and a half million Air India customers have had their personal data compromised, the airline has confirmed in a statement.  The notice comes a full two months after a reported cyberattack on SITA’s Passenger Security System.  [[post-object type=”divider” /]] What happened? SITA is a data processor that works…

The best free VPNs for iPhone and iOS users

Are you new to VPNs? Why not head over to Hannah’s blog to find user friendly guides and reviews.   [[post-object type=”best-buy-table” condensed=”right” title=”These are the best free VPNs for iPhone”/]] Paying for a VPN is always the best way to get a secure, fast service with all the bells…

WhatsApp punishes users for not accepting update

WhatsApp is trying to pressure its users into accepting a new privacy policy. Even if you don’t use the app yourself, this is a worrying development. If people can be bullied into submitting to questionable user agreements, the practice could become widespread among social media companies. Here’s why that’s bad news….

This app has been blocked for your protection — what does it mean?

Hackers have always liked Windows because of its popularity and poor security. Windows users are among the most affected by malware, ransomware, or phishing. One of Microsoft’s responses was Windows Defender, which blocks suspicious programs. But what if you want to decide for yourself which programs to install? What is Windows…

Online gaming: How to stay safe from hackers and vicious opponents

Just because online games take you to an imaginary world doesn’t mean that they can’t have real-life threats. Continue reading to find out what to expect in the gaming world and how to protect yourself from hackers or vicious opponents. Contents Why would anyone want your gaming account? How do hackers…

Are governments using zero-day exploits?

Can cybercriminals spy on you through unsecured apps on your phone? Absolutely. By taking advantage of zero-day exploits, hackers can infiltrate our devices and monitor our actions. But what if government agencies did the same thing? What is a zero-day attack? A zero-day attack takes place when someone exploits a zero-day…

How to Use a VPN and Tor together

Although in many ways very different, both VPN and the Tor anonymity network use encrypted proxy connections in order to hide users’ identities they can be used together. Using a VPN and Tor together can provide an extra layer of security and mitigate some drawbacks of using either technology exclusively. In…

How to change DNS on Fire TV stick

Using a VPN is the easiest and most effective way of spoofing your location on an Amazon Fire TV Stick (aka Firestick, but this also includes all Fire TV devices).  For more information on using a VPN on the Firestick, please see Best VPN for Fire Stick. How to change…

Digital rights activists file legal complaints against Clearview AI

A group of digital rights organizations have filed a series of legal complaints against the facial recognition company Clearview AI for its practice of scraping public data from the internet to power its invasive biometric identification systems. [[post-object type=”divider” /]] The leading group of activists includes Privacy International, Hermes Center…