Category: Privacy & Security

Search

What Is Whale Phishing?

Much like spear phishing (which generally targets an individual), whale phishing is a strategic scam specifically aimed at a high-value, powerful, or prominent target. This…

What Is “Vishing” or Phone Phishing?

As technology develops, so does the ingenuity of attacks on sensitive information. Cybercriminals use electronic communication to appear legitimate and trustworthy while asking for personal…

What Is Spear Phishing?

Phishing is a common type of scam aimed at stealing personal information from victims. The techniques phishers employ are becoming more sophisticated and varied. Considering…

Where Will Privacy Be in 10 Years?

When the International Association of Privacy Professionals recently released Visions of Privacy, a future-looking anthology of contributions from privacy thought-leaders around the world, we got…

Have I Been Hacked? How to Tell If You Have A Compromised Account and What to Do About It

Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain…

What Is the Google Docs Phishing Scam?

Cybercriminals continue developing frightening levels of sophistication into their scams. One particularly cunning example is the Google Docs phishing scam, which proved how everyone —…

Safely sell your stuff with MySudo

Selling items online is convenient, but can also feel risky. MySudo is a great tool for selling your old couch, bike, iPhone online or other…

What Is Phishing and How to Protect Yourself Against Phishing Attacks

Spam emails and texts are an ever-evolving annoyance. Filters and other methods of blocking spam are constantly being developed, but the spammers simply improve their…

How I Use a Privacy App in the Real World

Until recently, I fell into the group of people who have an ever-increasing number of emails piling up in their inbox every day. Having three…

What Is Identity Theft, and Can It Be Avoided?

Sometimes referred to as identity fraud, identity theft occurs when someone uses your personal information — such as your Social Security Number or driver’s license…

How to Keep Yourself and Your Devices Safe on the Road

Technology has made travel significantly easier in some ways, such as purchasing flights and booking hotels, but it has also led to new risks for…

Self-Sovereign Identities

Anonyome Labs is a privacy focused company. We build mobile applications and a partner platform that enable users to share the identity details they choose while…

Internet Safety for Children: 7 Tips to Protect Your Kids Online

As parents, we frequently agonize over the best approach to keeping our children safe online. If your child is old enough to use the Internet,…

The concerns around Australian Assistance and Access Act

There has been a growing anxiety around a new piece of legislation working its way through the Australian parliament. The official name is the Telecommunications…

Digital Privacy Does Matter to You

At this moment, there is a copy of every unencrypted email, text, photo, gif or emoji you have ever sent in your digital life. These…

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Never Miss An Update

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.