Blog
What are the Security Risks of Encryption Backdoors That can Affect Your Privacy and Security?
On 29th September, 107 Belgian organizations and cybersecurity experts wrote an open letter to their government calling for it to drop the draft law that would force companies to weaken their end-to-end encryption systems to provide access to law enforcement agencies. In the letter, the signatories say: Far from making Belgians sager, these requirements would […]
November 30, 2023
Email Scammers Use QR Codes to Bypass Email Security
Cloud email security company Abnormal identified and blocked nearly 200 emails sent to their customers between 15th September and 13th October 2021. These emails were all part of a phishing campaign that used malicious QR codes to steal Microsoft 365 credentials. By using the QR codes, scammers were able to circumvent the URL scan feature for attachments in traditional […]
How an App Tracks Your Location Before and After?
Does this sound familiar? You search for something on your mobile phone. Maybe it’s winter coats. You check some shopping websites, maybe even click on some ads. Next thing you know, whatever app you open, there’s an ad for winter jackets (or whatever you were searching for) wherever you go. Why does this happen even […]
How to Prevent Potential Privacy Breaches Because of Mistakenly Sending of Emails via Cc Instead of Bcc?
It’s quite funny how even after so many years of using it, people still make mistakes when it comes to sending emails. One of the most common (and most dangerous) is putting recipients into Cc (Carbon copy) instead of Bcc (Blind carbon copy). This can be a costly mistake as doing this constitutes a data […]
Secure Your Business with CTemplar Enterprise Email Encryption Software
Email communication is a vital tool for businesses, but it is far from secure and can expose an organization’s sensitive information and put its data at risk. This is why companies need to secure their data with different security solutions and one of the most important that they can use to prevent unauthorized access is […]
Can Mouse Movements Reveal Your Behavior?
We already know that the browser you’re using and how you’re using it can reveal a lot about your online behavior through browser fingerprinting, but did you ever consider how much can mouse movements reveal your behavior? According to the computer scientists at the University of Luxembourg and international partners, this is just the case. In […]
Unhealthy Data Harvesting Habits From Health Apps and More Bad Privacy Practices
Consumer data is an invaluable tool for companies to better understand their customers’ needs, wants and desires. In fact, all big tech companies engage in some form of data collection and even smaller ones do it. The problem, however, is when data collection turns into data harvesting. Almost all mHealth Apps on Google Play Engage in Bad […]
Best Hardware Security Keys for Multi-Factor Authentication
When it comes to securing online accounts, most people don’t think beyond a username and password and even then, they re-use their passwords or use weak passwords. Both of these habits are bad security practices as any hacker worth his salt can find a way to crack these passwords and take control of your online […]
Top 10 Privacy Activists to Follow on Social Media in 2022
You’ve probably heard the names Edward Snowden and Julian Assange being thrown around in a conversation about Internet privacy and digital surveillance, but those are not the only privacy activists whose names you should know. Here are 10 more privacy activists that you should pay attention to and follow on social media in 2022: Biggest […]
Why Augmented Reality is a Privacy Nightmare and What Can You Do to Protect Your Data in it?
One of the biggest news in the tech industry last year was the decision by Facebook to change its name to “Meta”. This isn’t your normal brand name change, it’s much more than that, but first and foremost, it shows which way Facebook wants to go. Virtual and augmented reality technology. Let’s take a look […]
Identifying People by Their Browsing Histories (Yes, it’s Quite Possible)
Most people don’t pay much attention to their web browsing histories (other than sometimes deleting it so that their significant others don’t see the sites they visit), but that can be a big mistake. In one of our previous articles, we discussed why it is important to hide your browsing history from your ISP and keep […]
When Your Freedom Depends on an App: How Government-Mandated Apps Can be Used for Mass Surveillance
When the coronavirus started to spread around the world, almost the immediate response of many countries has been to enforce the use of Covid-19 tracing apps in their populations. The idea was that this technology would help identify the people who have potentially been exposed to the virus and ultimately contain it. Well, as we […]
Surveillance Machines are All Around Us: What Types of Surveillance Equipment are Out There?
It’s really difficult these days to take two steps out of your home and not feel the eyes of video surveillance cameras on you. Today, wherever we go, whether in a store, a bank, or even outside in public areas, there is surveillance equipment to monitor us. So what are the different types of surveillance […]
Is Your Secure Browser Spying on You? (Which Online Security Tool and Secure Browser are Spying on You?)
As people start thinking more about online security, they realize that Google Chrome is not the only browser in town. Chrome is still (and will likely be for a very long time) the dominant web browser, with 81% of Internet users using it as of December 2021, according to W3Schools. However, in recent years, secure browsers […]
PHI of 138k individuals Exposed in 3 Email Security Incidents
Personal Health Information (PHI) of a combined 138,000 individuals have been exposed in three separate data breaches at Injured Workers Pharmacy, iRise Florida Spine and Joint Institute and Volunteers of America Southwest California, writes HIPAA Journal. Injured Workers Pharmacy Andover Injured Workers Pharmacy, Andover, Massachusetts, reported a data breach they discovered on 11th May, 2021 after […]
Zero Day Zimbra Mail Vulnerability Discovered
A new zero-day XSS vulnerability in the Zimbra webmail client, dubbed “Operation EmailThief” was discovered by the incident report company Volexity. According to a blog post, Volexity discovered a series of targeted spear-phishing campaigns last year in December against a customer from a threat actor identified as TEMP_Heretic. The attacker targeted organizations in the European government and […]
The Evolution of Phishing Campaigns and How You Can Fight Back
Phishing is not a new phenomenon. In fact, it has been around since 1996. Today, most people are familiar with phishing and what it looks like, so a regular phishing attack isn’t much of an issue to most email users. So why is it that hackers are still trying it? Didn’t they get the memo that […]
Governments are Using Secret Spyware. Can You Spot and Stop Hidden Spy Apps?
On 2nd October, 2018, a Saudi journalist, Washington Post columnist and dissident, Jamal Kashoggi was abducted from the Saudi consulate in Istanbul, Turkey by a team of 15 Saudi government agents, strangled and his body dismembered and disposed of. The murder of Jamal Kashoggi shook the world naturally, for its gruesomeness, but it also serves […]
What is Smishing and How to Protect Against it?
Most people who use email somewhat regularly have heard about phishing and may even have some idea how to protect themselves against it (if you don’t here’s a good reminder on how to protect from an email-based phishing attack). However, what a lot of folks don’t know is that phishing doesn’t have to come from only […]
What is Ransomware-as-a-Service (RaaS Model Explained)
A ransomware attack is one of the better known and most feared online security threats and each year it gets worse. So what is behind this growth of ransomware attacks? Many things, but one in particular – ransomware-as-a-service (RaaS). What is a Ransomware Attack? To understand the ransomware-as-a-service, we need to understand the ransomware attack itself and know […]