How To: Managing Your Google+ Security Settings

Google+ is Google’s social networking site that is similar to Facebook. Below are some tips on how you can use Google+’s security and privacy options to make your Google+ experience a safe one. Turn Off Photo and Geolocation Tagging By default, Google+ inserts geolocation information into any photo you upload, and allows your face to… Read More


How To: Foursquare Security Issues

All social networking websites reveal person information about ourselves. However, these risks are escalated when using Foursquare, a website which exists to tell our friends where we are. This article discusses some of the security issues you should be aware of if you use Foursquare. Its Risky to Broadcast Your Location If you use Foursquare… Read More


How To: GPS and Mobile Phone Privacy

GPS stands for Global Positioning System. Mobile phone GPS tracking can prove useful in many walks of life and especially when an emergency arises. For these reasons, the FCC has instructed that wireless network providers provide the mobile phone GPS tracking location information for 911 calls which have been made by callers. However, because a… Read More


How To: BlueKai, Online Tracking, and Your Privacy

BlueKai is an online marketing firm that provides data to marketers, ad networks and publishers. This data is used to target ads to consumers. This information that BlueKai gathers is considered “anonymous” because it identifies web browsers, not individuals. However, because they gather data from multiple sources, it’s easy for them to build a very… Read More


How To: Managing Your Email Security

Most if not all of us use email as our primary means of communication. Unfortunately, email accounts are also highly vulnerable, so email security is an important issue for all of us. This article discusses some steps you can take to ensure that your email account is secure. Email Threats Below are some of the… Read More


How To: Managing Your Google and Gmail Security

If you use Gmail you probably store a lot of important personal information in your account, such as photos, files, and calendar information. This article discusses the ways in which your account could be comprised, and lists some steps that you can take to help protect your account. Hacker Methods Hackers can get access to… Read More



How To: Lotame, Online Tracking, and Your Privacy

Lotame is a behavior targeter focused on social networks, like Facebook. The information that Lotame and other similar companies gather is considered anonymous because it identifies web browsers, not individuals. However, aggregating data from multiple sources means companies can easily create a detailed profile of a user that many privacy experts believe can actually identify… Read More


How To: eXelate, Online Tracking, and Your Privacy

eXelate Media is a company that collects and sells web data on consumers. EXelate has been criticized for linking web-surfing habits with personal data, since this crosses a major privacy line. eXelate gathers consumer data from hundreds of websites and can determine a consumer’s demographic information and web habits using cookies. Though eXelate claims its… Read More


How To: Job Search Sites and Your Privacy

Make sure you protect your privacy while conducting an online job search. The following sections describe what steps you can take to ensure your privacy. 1. Don’t include a lot of personal contact information (name, address, phone numbers) on your resume This might make it a little more difficult for an employer to reach you,… Read More