Blog

Stay informed with our latest publications.

Unhealthy Data Harvesting

Unhealthy Data Harvesting Habits From Health Apps and More Bad Privacy Practices

Consumer data is an invaluable tool for companies to better understand their customers’ needs, wants and desires. In fact, all big tech companies engage in some form of data collection and even smaller ones do it. The problem, however, is when data collection turns into data harvesting. Almost all mHealth Apps on Google Play Engage […]

January 21, 2022

mouse movements reveal your behavior

Can Mouse Movements Reveal Your Behavior?

We already know that the browser you’re using and how you’re using it can reveal a lot about your online behavior through browser fingerprinting, but did you ever consider how much can mouse movements reveal your behavior? According to the computer scientists at the University of Luxembourg and international partners, this is just the case. […]

January 21, 2022

Secure Your Business with CTemplar Enterprise Email

Secure Your Business with CTemplar Enterprise Email Encryption Software

Email communication is a vital tool for businesses, but it is far from secure and can expose an organization’s sensitive information and put its data at risk. This is why companies need to secure their data with different security solutions and one of the most important that they can use to prevent unauthorized access is […]

January 17, 2022

Potential Privacy Breaches Because of Mistakenly Sending of Emails via Cc Instead of Bcc

How to Prevent Potential Privacy Breaches Because of Mistakenly Sending of Emails via Cc Instead of Bcc?

It’s quite funny how even after so many years of using it, people still make mistakes when it comes to sending emails. One of the most common (and most dangerous) is putting recipients into Cc (Carbon copy) instead of Bcc (Blind carbon copy). This can be a costly mistake as doing this constitutes a data […]

January 16, 2022

How an App Tracks Your Location Before and After?

How an App Tracks Your Location Before and After?

Does this sound familiar? You search for something on your mobile phone. Maybe it’s winter coats. You check some shopping websites, maybe even click on some ads. Next thing you know, whatever app you open, there’s an ad for winter jackets (or whatever you were searching for) wherever you go. Why does this happen even […]

January 10, 2022

Microsoft Edge and OneDrive Syncing Without Warning or Consent

Microsoft Edge and OneDrive Syncing Without Warning or Consent

When Google Chrome introduced Sync in 2012, many users saw this as a helpful feature since they could now have their documents available on all their devices at the same time. Soon after, more browsers, including Firefox, Edge, Opera, followed, introducing browser syncing to their users as well. However, before you give your browser and […]

January 9, 2022

security risks of encryption backdoor

What are the Security Risks of Encryption Backdoors That can Affect Your Privacy and Security?

On 29th September, 107 Belgian organizations and cybersecurity experts wrote an open letter to their government calling for it to drop the draft law that would force companies to weaken their end-to-end encryption systems to provide access to law enforcement agencies. In the letter, the signatories say: Far from making Belgians sager, these requirements would […]

December 25, 2021

What is Facial Recognition?

What is Facial Recognition? Should You be Worried About Facial Recognition Security?

Telling a human face is a core social skill and one that we developed throughout our evolution. But not everyone is as good at it which makes facial recognition done by humans spotty at best. In recent years, facial recognition technology has seen a surge as the market size is expected to grow from $3.8 […]

December 25, 2021

Scammers Use QR Codes to Bypass Email Security

Email Scammers Use QR Codes to Bypass Email Security

Cloud email security company Abnormal identified and blocked nearly 200 emails sent to their customers between 15th September and 13th October 2021. These emails were all part of a phishing campaign that used malicious QR codes to steal Microsoft 365 credentials. By using the QR codes, scammers were able to circumvent the URL scan feature […]

December 22, 2021