Category: internet privacy

How to Use Translation Apps and Extensions Without Sacrificing Your Privacy

Read full article:
at LifeHacker

When you want to translate something, the easiest option is often a free translation service like Google Translate. But you should avoid pasting sensitive information into free translation services, as your data could end up in the public domain or used for advertising. (Generally, if you have highly sensitive…

Read more…

Read full article:
at LifeHacker

How to Download Everything Amazon Knows About You (It's a Lot)

Read full article:
at LifeHacker

Here’s a fun thought experiment; picture the amount of personal data you think tech companies keep on you. Now, realize it’s actually way more than that (hmm, maybe this isn’t that fun). Even as privacy and security become more talked about in consumer tech, the companies behind our favorite products are collecting…

Read more…

Read full article:
at LifeHacker

How to Protect Your Student Laptop and Accounts From Hackers

Read full article:
at LifeHacker

Cyberattacks are a huge risk, and they’re on the rise. College students—especially those who are away from home, bringing their devices to class, or frequently connecting to public wifi—may be particularly vulnerable to hacks and cybercrime. Here’s how they can avoid becoming a victim of a cyberattack.

Read more…

Read full article:
at LifeHacker

How to Know When Your iPhone Could Be Recording You

Read full article:
at LifeHacker

You’ve probably had the (legitimate) fear that your smartphone is listening or watching you. Your iPhone certainly isn’t without privacy risks, and you should absolutely audit your settings and all of your app permissions, but one helpful feature that Apple has built in is a visual warning when your device is queued…

Read more…

Read full article:
at LifeHacker

How to Find and Delete All Your Old, Unused Accounts

Read full article:
at LifeHacker

We all have accounts we no longer use, but some apps and websites make deleting your profile a pain. In those cases, simply ignoring them is an easier option. However, unused accounts are a major security threat—all it takes is one successful data break or credential-stuffing attack to potentially compromise your…

Read more…

Read full article:
at LifeHacker