tech

share

Webcams make it possible for us to make face-to-face calls with friends and family over the internet. These days, webcams are built into most laptops, many desktop computers, and mobile devices, so it’s important for everyone to understand the risks. 

 

share

Have you wondered what to do with your old tech that is just sitting there collecting dust? The ones that you have not switched on for months or years as there is no use for it anymore? At some point you'll want to get rid of it to make some space.  

 

share

 

There will come a time when you feel that your computer is slowing down, becoming less efficient than it used to be, and what comes to mind is to either recycle or sell off the parts to get a brand-new computer. However, is it safe to do so? 

 

Most people would think that formatting the hard disk would completely clear the disk, so it would be safe to sell it off as a second-hand item. Unfortunately, with no proper precautions, someone can easily recover and extract personal or corporate data that was previously stored in the disk.  

 

share

 

Has it ever occurred to you that the things you throw in your bin might be valuable to someone else? Most people don’t think someone would dig through their trash for information, but Dumpster Diving is a technique which provides easy access to personal information from discarded documents such as receipts, bills, copies of passports and identity cards. 

 

Who are dumpster divers? 
It could be anyone, including someone within your workplace or an outsider who is spying on you, including friends or neighbours. 

 

share

The internet is a powerful tool that can be used for education for children as it supports their learning and research. However, the internet has potential dangers that come with it. As a parent, it’s your responsibility to protect children from the dangers of being online as there are explicit, disturbing and illegal sites online that children should not have access to. 

 

share

 

Public Wi-Fi hotspots are usually unsecured, since they are intended for users to easily connect to them. Information sent through unsecured wireless transmissions are usually not encrypted, so it’s easy for the data to be intercepted. 

  

Here are some of the risks you’re taking when connected to a public wi-fi hotspot: 

  

Pages