Search Results

Filter
  • POST

    5 Simple Mobile Phone Security Tips

    It’s a well-known fact that the technical inventions we use daily can make us an object of viral infections and digital assaults on the off chance that things do not go as expected. With regards to cell phone use, there is no manual that accompanies...
    19-05-2022
  • POST

    Quick Tips: Digital Security Best Practices for CSOs in Africa

    Technology and its use have over the years evolved into an almost inevitable tool in the work we do. We have witnessed maximum effectiveness and efficiency in accomplishing tasks in our daily work routines and schedules which has led to high reductio...
    17-05-2022
  • POST

    Five Tips on Protecting Your Passwords

    Here are five tips that will help you achieve this:Tip 1: Use a Password ManagerPassword management tools, or password vaults, are a great way to organize your passwords. They store your passwords securely, and many provide a way to back-up your pass...
    29-04-2022
  • POST

    The State of Cybersecurity in North Macedonia - Interview with an Expert: Elena Stojanovska

    Should the typical citizen in North Macedonia today feel safe online?Honestly, I think the answer to this question is quite complex. The sense of security is largely subjective and is closely related to how each of us experiences privacy. What one pe...
    01-04-2022
  • POST

    Informative video contents on Hive Mind available in English

    These are our favorite courses with useful and helpful contents. We recommend the following links to our readers:#OpSec: https://en.hive-mind.community/blog/71,hive-mind-resources-radically-open-security-opsec-webinar-practical-tools-to-stay-safe-amp...
    29-03-2022
  • TOOL

    Guardian Project

    Guardian Project creates easy-to-use secure apps, open-source software libraries, and customised solutions that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception a...
    19-06-2023
  • POST

    We are deceived because it is good for us - Our cognitive weaknesses and how pseudo-news works

    Social media is based on continuous positive feedback from other users on user messages. The operators of these platforms have an obvious interest in ensuring that users spend as much time as possible on their platforms, and to do this they have a we...
    24-03-2022
  • POST

    Consciously shaping the digital footprint

    The resulting digital footprint is much easier to track than most users think. This allows web services and the companies that run them to tailor digital content to users' tastes and interests, and for advertisers to track users' buying habits and pr...
    23-03-2022
  • POST

    Why reading Facebook’s Community Standards is a Worthwhile investment of your Time

    In the first third of the article, we focus on the sections of the Community Standards which affect the general populous; this section is useful for everybody. In the second third of the article, we focus on specific social groups and the difficultie...
    23-03-2022
  • POST

    What to Do When the Social Media Pages of an Organisation Have Been Hacked?!

    What do phishing emails target?Online criminals – like their offline counterparts – want money in the first place therefore they mainly strive for getting the data of bank cards or internet bank accounts, but are practically after anything from email...
    23-03-2022
First Page Previous Page 1 ... 9 10 11 12 13 14 ... 16 Next Page Last Page