An Idiot-Proof Guide to be Safe On the Internet

Are we really secure? (Part-5) - Browse Clean and Safe

You must’ve heard about tech giants not taking the protection of their user’s data seriously at all, yet again. And various news articles are already doing the rounds of my news feeds, yet again. From Quora to Facebook (well no surprises there), and even TRAI’s Chairman R.S. Sharma’s personal details were posted online after he openly challenged the Internet to do so. On 21 December 2018, The Ministry of Home Affairs issued an order authorizing 10 Central agencies to intercept, monitor, and decrypt “any information generated, transmitted, received or stored in any computer. [Read More]

Bugs and Vulnerabilities

Are we really secure? (Part-4) - Understanding bugs and vulnerabilities

No matter how much time is devoted to developing an app or a website, or under how many eyes it passes through during its development stages, they still have vulnerabilities. Some have more so than others and some are just unusable. Every vendor on this planet has a security issue with their product. It has now become a fact of modern-day life. Take Microsoft for instance. CVE Details, a site that chronicles publicly disclosed vulnerabilities shows that in the 10 years starting with 2006 the company has disclosed an astonishing 3,157 security flaws. [Read More]

Apps and Permissions

Are we really secure? (Part-3) - How an app on your mobile phone is a potential threat

Android is an operating system for handheld devices like smartphones. It was announced in 2007 and was the first commercial device was released in 2008. Today, after exactly a decade in the future, it has more than 2 billion monthly active devices. With such level of a userbase, sure comes a lot of prying eyes on your data. Though Google Play Store has restrictions on what you can install and what data your apps see, it is just a matter of a few permissions before these apps can start harvesting your data. [Read More]

Data Breaches

Are we really secure? (Part-2) - Data breaches and how they work

In the last post, I talked about how people unknowingly give away the data which can be used to draw statistical inferences to a large degree of accuracy for a particular region or a country. There is another bigger threat to our data - ‘Data Breaches’. You store photos in the cloud and you save storage, you use online platforms that save your details and you are okay with it, you buy something online and all your online transactions are stored in a database. [Read More]

Data Protection

Are we really secure? (Part-1) - A look at what worries me the most

Modern day technologies for sure provide much more efficient, convenient and sometimes creative solutions to our problems. Want to talk for free with a relative thousand miles away? Open an app and that’s it, talk as much as you want, this was not at all possible before. Solutions like these are all around us and we use them on a daily basis. Stuck in a new city? Open the map app and get going, it will track you in real time too. [Read More]