These days we really do rely on our mobile phones and it is quite scary to think how much your phone knows about you, where you have been and who you have seen. It even knows some of your favourite hobbies, interests and activities. It is in essence your digital brain! What would you do … Continue reading What Does Your Phone Know About You?
If you are anything like me then you have passwords for everything from banking to logging into your social media accounts. So many passwords to remember or in my case forget! But what happens when you find an issue or alerted to an issue? Have you ever seen Facebook come up with an alert stating … Continue reading Friday Fun: Password Management
This week sees thousands of marketing, IT and technology professionals uniting at the ExCel London for Internet World - the flagship event of London Technology Week. Over the course of three days, Internet World will bring together business leaders, IT specialists, developers, technical experts, digital marketing and business development professionals with leading technology innovators and solution … Continue reading SocialSafe Talks Personal Data At Internet World On 18th June
You will no doubt have read or heard an awful lot about the 'Heartbleed' security vulnerability affecting a huge number of websites and online services, and you will also have been told to change a lot of your passwords. The problem with doing that right now is that if the services themselves haven't addressed the … Continue reading Do You Know Which Passwords To Change After Heartbleed?
The Heartbleed security vulnerability caused by an OpenSSL issue is affecting many websites and web-based services, forcing users to update their login information. Not only is there the hassle of having to change a lot of passwords, but there's also the fact that if your details were stolen then the thief would have access to the … Continue reading Why SocialSafe Users Are Unaffected By Heartbleed
In the case of protecting your social network accounts, it's not necessarily the individual networks that may be the weak link in the chain. When you think about the mechanism by which you log in to all of the different services and networks that you use on a daily basis, there is usually one common … Continue reading Is Your Email Provider The Skeleton Key Hackers Are After?