How Walgreens’ sloppy Covid-19 test registration system exposed patient data

Vice my Sara Morrison

Read more at Vice

Download PDF here

Lawsuits say Siri and Google are listening, even when they’re not supposed to

Washington Post by Rachel Lerman

Read more at Washington Post

Download PDF here

Why is your identity trapped inside a social network?

ZDNet by Tiernan Ray

Read more at ZDNet

Download PDF here

Amazon will pay you $10 in credit for your palm print biometrics

TechCrunch by Zack Whittaker

Read more at TechCrunch

Download PDF here

T-Mobile says at least 47M current and former customers affected by hack

TechCrunch by Zack Whittaker

Read more at TechCrunch

Download PDF here

Israeli Spyware Maker Is in Spotlight Amid Reports of Wide Abuses

NYTimes by Ronen Bergman and Patrick Kingsley

Read more at NYTimes

Download PDF here

Top German court strikes down Facebook rules on hate speech

Originally at EuroActiv

Read more at EuroActiv

Download PDF here

Your Facebook Account Was Hacked. Getting Help May Take Weeks — Or $299

NPR by Shannon Bond

Read more at NPR

Download PDF here

All the Ways Spotify Tracks You—and How to Stop It

Wired by Matt Burgess

Read more at Wired

Download PDF here

Self-check links

Links below provide you with an option to use existing privacy websites to check your online exposure.

Deep Dive Articles

Want to know more about the evolving world of technology around you? Want to prepare against the vulnerabilites and threats in your life online? Well right here is the perfect place to start your self education.

5 Emotions Used in Social Engineering Attacks
What is social engineering and how does it effect you? What can you do to fight back against it? What should you avoid when someone tries to manipulate you?

Here is a breakdown of how social engineering works and how you can avoid falling for it, along with some examples of what social engineering looks like.

Read at

What is a VPN and How Does It Work?

In today’s world, fraught with the dangers of hacking and ransomware, there’s more and more talk of using VPN’s to communicate, especially when working from home. But what are VPNs, and how do they work? Why should you use them?

Here is a explanation of the complexities of VPNs, and simplifies the technology behind it. From the basics of function to suggested VPN’s for your own use, this is the ultimate guide.

Read at

Experts tips and tricks

You are in the right place!

Your are not alone!

We understand your concerns and have compiled a list a our suggested tips and tricks to reduce your digital footprint.

Free Family DNS filter service offers free filters for your Home network. Follow this link for instructions:

Cleanbrowsing Family DNS filtering

Freeze your credit!

Credit Freeze information

Trans Union: 1-888-909-8872

Equifax: 1-800-349-9960

Experian: 1-888-397-3742

Browser passwords

While not having to enter your credentials into a website portal every time you log in, might be convenient, but  best practice recommends against it. Your stored Browser password could be viewed by an unauthorized user. Instead use a Master Password for each browser or a Password Manager like PasswordBoss

Don't link accounts

Don’t associate your social media accounts with other accounts.

When you create a new account, you might be asked to log in, or connect with your social media account. Best practice recommends against that step. You might allow personal information to be shared between those accounts. Read the End User License   Agreement BEFORE you click accept.



Powered by: National Cyber Security Alliance

Keeping Children safe online

Concerned Parent’s Internet Safety Toolbox

Homeland Security


White House

Talking with Kids About Being Online

Learn about tracking technologies, market structure and data-sharing on the web

Windows 10 Privacy settings

The Windows 10 Privacy Settings You Should Check Right Now

The Privacy Project

The New York Times

One Nation, Tracked

The New York Times

Inside the Smart Home

IoT Device Threats and Attacks Scenarios

The IoT Attack Surface: Threats and Security Solutions