Number of Posts: 3
Posts 1 - 3
Emma Watson, Emilia Clarke and Harry Styles Instagram accounts HACKED in major social media security breach
Newspaper | Mirror
Date | 1.9.2017
Language | English
Country | UK
Topic Tags | Instagram, privacy, social media, threat
Summary | A few celebrities' Instagram accounts have been hacked because of a bug in the system. The phone numbers and email addresses of celebrities were being sold on the dark web.
Image Description | Portraits of Emma Watson, Emilia Clarke and Harry Styles, charts, and hand on a keyboard.
Image Tags | chart, computer/laptop, female(s), hand(s), male(s)
5 easy and simple ways to protect your privacy online - how to prepare for the next big threat
Newspaper | Mirror
Date | 18.8.2016
Language | English
Country | UK
Topic Tags | privacy, threat
Summary | Privacy expert Mark Weinstein shares some tips to protect your privacy online: use safe internet browsers, be careful where you search (for instance, Google saves all of your searches), WhatsApp is not as private as what you might think, use a cloud storage that can't see your information, etc. We should be worried about our privacy in the future as governments are trying to get backdoor access to apps and digital devices. Millennials seem to be the ones that are most concerned about their online privacy.
Image Description | Photographs of a woman in front of social media icons, two hands using computer mice and a keyboard, fingers touching a screen displaying the Google search bar, WhatsApp icon, cloud storage icons, hand holding a smartphone in front of the Facebook logo, portrait of Tim Cook, and Facebook "laughing" reaction button
Image Tags | emojis, Facebook, female(s), Google, hand(s), keyboard, male(s), smartphone, social media, WhatsApp
Free Tools to Keep Those Creepy Online Ads From Watching You
Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)
Page 1 of 1