The deep web is a vast resource of information much of it academic and of great value. However, there is a shadow side, one where stolen identities are offered for sale, among other things. We explore what the deep web means, why it exists and highlight some of the things you need to be aware of for identity theft protection.
Hackers have turned their attentions to creating false social media ‘likes’ as they follow the money. By revamping an existing virus called Zeus and secretly planting it in thousands of computers there’s a real threat that in time it could also be used to carry out far more damaging actions.
Today, we ask the question that many of you have been curious about – just how private are your text messages?
It’s not new news that texting has taken over. You’ve got at least one friend that doesn’t like to talk on the phone anymore, and only texts. That friend isn’t alone, in fact, 55% of those that text a lot, agree they’d rather text than talk.
Good News! The EU Commission has put in place a process for how telecom operators need to handle incidents of online privacy breaches and identity theft. This is a massive step forward in the defence of customer data. The technical measures have been implemented to ensure all victims of customer data breaches receive equal treatment as well as a solid response from the telecom operators responsible for the privacy and safety of that data.