privacy

share

Imagine going through your Facebook feed and then suddenly seeing your photo and your name on the “People you may know” list. You know you don’t have another Facebook account and you click on your second profile. 

 

You’re shocked by what you see. Photos from your original account are posted. Your friends are on the list and they’ve been commenting on the photos. And the person who’s impersonating you has been responding to the comments as though it was you! 

 

Why would someone create a fake social media account? 

share

 

Webcams make it possible for us to make face-to-face calls with friends and family over the internet. These days, webcams are built into most laptops, many desktop computers, and mobile devices, so it’s important for everyone to understand the risks. 

 

share

 

Here are 5 tips to be safe while gaming online:  

 

Tip #1 - Beware of cheat codes & programs 

Yes, sometimes we have trouble getting to the next level as games are designed to be challenging. A ‘cheat’ code or program can help gamers to have shortcuts without spending so much time on the game. However, downloading the ‘cheat’ may contain viruses or spyware without you realizing it.  

 

share

 

Your phone notifications show a preview of new messages 

Even when your phone is locked, new messages are previewed on your locked screen and anyone near your phone can read them. To disable this feature: 

iPhone:                WhatsApp settings > Notifications > Show Preview – and turn it off. 

Android:              WhatsApp settings > Notifications > Pop up notification > No pop up 

  

Automatically saving images and videos that you receive 

share

 

There will come a time when you feel that your computer is slowing down, becoming less efficient than it used to be, and what comes to mind is to either recycle or sell off the parts to get a brand-new computer. However, is it safe to do so? 

 

Most people would think that formatting the hard disk would completely clear the disk, so it would be safe to sell it off as a second-hand item. Unfortunately, with no proper precautions, someone can easily recover and extract personal or corporate data that was previously stored in the disk.  

 

share

 

Has it ever occurred to you that the things you throw in your bin might be valuable to someone else? Most people don’t think someone would dig through their trash for information, but Dumpster Diving is a technique which provides easy access to personal information from discarded documents such as receipts, bills, copies of passports and identity cards. 

 

Who are dumpster divers? 
It could be anyone, including someone within your workplace or an outsider who is spying on you, including friends or neighbours. 

 

Pages