internet privacy

Article
Different Techniques Used for Social Engineering Attacks
Different Techniques Used for Social

Social Engineering is the act of deceiving people into gaining access to sensitive data by preying on human psychology. The main difference...

Article
The Impact of Social Engineering on a Student’s Future
The Impact of Social Engineering on a

One of the most recent trends in cyber related crimes is targeted social engineering. It is easier to communicate with a person to gain...

Article
Creating Awareness about Social Engineering
Creating Awareness about Social Engineering

You may read in newspapers and also hear on news channels about the theft of customer data from banks and telecom organizations. You might...

Article
Educating Students to Resist Social Engineering Attacks
Educating Students to Resist Social

Teenagers who are attracted to online services find themselves vulnerable to online risks. Since they are eager to make new friends online...

Article
Protecting Student Online Privacy
Protecting Student Online Privacy

Identity theft is a serious problem. Children, teenagers, adults and elderly people, irrespective of gender and income level can all become...

Article
Ensuring Students’ Online Privacy
Ensuring Students’ Online Privacy

It is said that once your information is on the internet, you have lost control of the information. It can be used, misused and abused in...

Article
The role of educators in protecting privacy
The role of educators in protecting privacy

As educators you need to protect your privacy and also train others to do the same. The irony is that nowadays if we don’t post about...

Article
Educator’s Privacy Protection
Educator’s Privacy Protection

Privacy compromise is a threat for both adults as well as teenagers. With the usage of digital media in every work field, protecting one’s...

Article
Online Activities that Expose your Privacy
Online Activities that Expose your Privacy

The internet is used in so many aspects of our daily lives. From making bank transactions, booking travel reservation, paying utility bills...