Stay informed with our latest publications.

CTemplar is shutting down

April 26, 2022

Your Guide to Android Permissions

Your Guide to Android Permissions: When to Accept and When to Refuse App Permissions?

Does this message look familiar? Most apps out there will ask for access to some of the features on your phone the first time you open it. This can be location, camera, microphone, photos, phone calls, messages and more. Here’s the question: should you always allow Android app permissions? In this article, we’ll show you […]

April 22, 2022

What is Cyber Warfare

What is Cyber Warfare and How is Cyber War Waged?

Despite the current conflict in Ukraine, our modern society sees a lot fewer armed conflicts than 3-4 decades ago for instance. Most countries realize that it’s better to “play nice” with others, rather than pull out their guns and risk the lives of their people for what usually amounts to little to no gain. That […]

April 17, 2022

How to Detect Stalkerware Apps

How to Detect Stalkerware Apps on Your Mobile Device and Protect From it?

Put down your mobile phone for a moment. Someone might be spying on you as you are using it. In this article, we’ll explain how to detect stalkerware on your both Android and iPhone mobile devices and how to protect yourself from it. What is Stalkerware? In 2019, Google discovered and removed 7 stalkerware apps […]

April 13, 2022

Security and Privacy in the Metaverse:

Security and Privacy in the Metaverse: How to Keep Your Virtual Life Safe?

On 28th October, 2021, Mark Zuckerberg, the CEO of Facebook, introduced a radical change to the biggest social network and his other services at the Connect 2021 conference. That change was the shift from the digital world and social media platforms to augmented reality and virtual reality, or the metaverse (the term coined first by […]

April 11, 2022

What is the Difference Between XSS vs CSRF Attacks

What is the Difference Between XSS vs CSRF Attacks and How to Prevent Them?

XSS and CSRF are two of the most common client side attacks. However, they are very different. In this article, we’ll take a look at the difference between XSS vs CSRF attacks and what you can do to prevent these two attacks. What is a Client Side Attack? Before we start explaining what are XSS […]

April 10, 2022

The Educator's Guide to Student Privacy

The Educator’s Guide to Student Privacy: How to Protect Student Data?

The notion of what counts as “student data” has changed drastically in the last few years. While before student data referred mostly to the student’s name, address, age, demographics, what course they’ve taken and their final grades, with the spread of information technology, including computers and mobile devices and the students themselves generating huge amounts […]

April 9, 2022

Can Someone Track My Phone Even if I Have Location Tracking Off?

Can Someone Track My Phone Even if I Have Location Tracking Off?

Most people today can’t live without a mobile phone in their pocket. Everywhere they go, they absolutely must carry it with them or they will miss the most important phone call of their life or someone will post something monumental on social media. The truth is that the world will keep spinning even if you […]

April 2, 2022

Your "Right to Privacy": What Do the Constitution and the Law Say?

Your “Right to Privacy”: What Do the Constitution and the Law Say?

You’ve probably heard the phrase “Life, Liberty and the pursuit of Happiness” from the U.S. Declaration of Independence. While not legally binding, this motto is the cornerstone of the United States government and the Constitution. This, of course, isn’t the only such motto. The French have “Liberte, Egalite, Fraternite” (Liberty, Equality, Fraternity), the British“Peace, Order […]

March 27, 2022