Skip to content

Online Privacy

The Ashley Madison Scandal Resurfaces

When Ashley Madison, the dating website for cheaters, launched in 2002, it was seen as a fringe space for clandestine affairs. However, by 2015, the site claimed 31.5 million members and boasted international, high-profile recognition.  Despite a questionable mission — to foster and facilitate infidelity — Ashley Madison was primed to “go public” and hoped…

[Read More]

FastPeopleSearch Opt-Out Guide

FastPeopleSearch is a free people search website owned by PeopleFinders that allows users to search for personal information; this includes information such as names, addresses, phone numbers, and relatives. Sites like these are common forms of data brokers. If you are concerned about privacy, you may want to remove yourself from FastPeopleSearch. In this article,…

[Read More]
Two women realizing they were scammed online during a humanitarian crisis

How Online Scammers Take Advantage of Humanitarian Crises

Unfortunately, global, national, and local humanitarian crises are mostly out of our control. A hurricane or a tornado hits and wipes out an entire town. A pandemic strikes worldwide and millions are left suffering. Often, this brings out the best in humanity — common people band together to help those in need. However, crises also…

[Read More]

A Comprehensive Guide to Stopping Data Collection

In today’s digital age, protecting personal information has become increasingly important. With data breaches and privacy violations making headlines, it’s crucial for consumers to take matters into their own hands. This guide will help protect you from data collection on the internet by covering key areas such as masking your payments, IP address, device fingerprint…

[Read More]

Data Brokers, Their Methods, and How to Protect Your Identity in the Digital Age

In today’s digital world, data is the new oil that powers millions of applications. Much of this data is harmless and even helpful for individuals. An example would be salary information such as that available on Levels. FYI for those compare compensation plans. We’re going to focus on those that specifically aggregate and sell consumer…

[Read More]
A phone and laptop displaying emails unread

What Is Email Spoofing – And How Does It Work?

Cyber criminals and spammers use email spoofing to trick email recipients into believing that they have received a message from someone they know or an account they trust.  To commit an email spoofing attack, the attacker forges a fake email header. It displays a familiar (but fraudulent!) name to the recipient.  Because most people take…

[Read More]
An image displaying a close-up of a web input for a login and password

What SQL Injection Is & How It Works

SQL injection is a mechanism that cyber attackers use to interfere with application queries to a database. Specifically, SQL injection exploits a security vulnerability and gives hackers access to data that they shouldn’t have access to. How SQL Injection Works To understand SQL injection (SQLi), you have to first understand code injection and SQL. “Code…

[Read More]
A woman paying online using her credit card

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is an important concept in privacy laws and online security.  Put simply, PII is any information that can be used to identify an individual. PII can be one piece of information that identifies a person, or it could be information that must be combined with other relevant data to successfully identify…

[Read More]