Online Privacy

Explainer: Should You Change Your Password After Heartbleed?

The Conversation UK | Posted 11.04.2014 | UK Tech
The Conversation UK

If you're struggling to understand the deluge of information about the Heartbleed vulnerability, you're not alone. Some reports tell us to change all our online passwords immediately, others warn us that this could do more harm than good. There is a lot of misinformation out there.

Trustful Tinder?

Eden Blackman | Posted 03.04.2014 | UK Lifestyle
Eden Blackman

Those of us who have ever used dating sites will not be shocked to learn of another story centred around fake profiles breaking in the world of online dating - today it's Tinder under the uncomfortable spotlight. It seems Tinder (owned by InterActiveCorp who also own and OKCupid) have been hit by the bots

Why the Debate's More Than Just About Women Who Eat On Tubes

Sophie Alderson | Posted 14.03.2014 | UK Comedy
Sophie Alderson

I'm a member of divisive Facebook Group Women Who Eat On Tubes. I joined because I didn't like what I saw. If you've read enough on the subject, or need to alphabetise your dried herbs, you're excused.

Data Protection: The Shape of Things to Come

European Parliament Web Team | Posted 10.03.2014 | UK Politics
European Parliament Web Team

The way personal data will be used and protected in Europe will change as a result of decisions to be taken this week. The European Parliament will vote on rules governing the collection and use of personal data, including for law enforcement purposes...

Abortion and Women's Other Secrets: What Do We Do With Our Shame?

Paula Coston | Posted 27.02.2014 | UK Lifestyle
Paula Coston

There are statistics, news stories and articles everywhere about women made ashamed and guilty by secrets: singledom, childlessness, genital mutilation, forced marriage, physical or sexual or emotional abuse, menstrual conditions, the size and shape of their labia...The list goes on.

Clouds Will Make Us Invisible

Dr. Peter Cochrane | Posted 21.02.2014 | UK Tech
Dr. Peter Cochrane

First: social clouds will see all the activities of social networking in virtual space translated into real space. If you know someone virtually and they drift into your real space, our mobile devices recognise this and flag the situation. It will be irresistible not to meet and greet!

Tinder Was Giving Away Your Exact Location Last Year

Huffington Post UK | Posted 20.02.2014 | UK Tech

Tinder - a brutal dating app, but one that removes the "do they, don't they" awkwardness of approaching people in real life while keeping people at en...

Online Privacy: Terms of Engagement

Louise Orpin | Posted 09.04.2014 | UK Tech
Louise Orpin

Negative comments. We all get them. Not many of us enjoy them, but the majority of us can take the rough with the smooth. However, there is always that one statement (the straw that breaks the camel's back, if you will) that forces us to snap. To respond. To cause an issue. But what makes us do this? And why can't we take a step back, a deep breath, and realise that it's not that big a deal?

How to Send a Mass Email

Rachael Phillips | Posted 01.04.2014 | UK Tech
Rachael Phillips

Now I love public relations professionals but one of the key skills needed in this field is learning how to use that all important bcc box. Journalists, bloggers and anyone else who receive press releases know that they're not special. We know that PR's aren't sat in their fancy offices individually sending us press releases with love. But we don't need to KNOW that the emails are going out en masse.

Online Privacy: Integrating Integrity

Louise Orpin | Posted 24.03.2014 | UK Tech
Louise Orpin

Our social networks have become part of all walks of our life. LinkedIn was once your 'go-to' site for connecting with colleagues, but now the paths of our digital personas cross over, making Instagram and Facebook as important as WhatsApp, Snapchat and Twitter.

Big Data in 2014: Five Predictions

Mark Braund | Posted 11.03.2014 | UK Tech
Mark Braund

2013 was a year in which big data became a 'hot topic' for discussion and debate, reaching far beyond the usual industry journals and making the mainstream news for a number of good and bad reasons. With that in mind there has been a great deal of speculation about what trends we should expect to see in big data in 2014.

Why You Should Buy Internet Security and a Winter Coat

Lucy Karsten | Posted 29.01.2014 | UK Tech
Lucy Karsten

'You've got a virus,' my little sister said finally, sneering at me in a way that made it perfectly clear that she considered the whole matter beneath her. 'What internet security provider are you using?' I laughed, because internet security software is like ironing, or packing the night before a flight- done only by the neurotic or the elderly.

Dissenting Factions Within the Internet Safety Community

Dr Rachel O'Connell | Posted 23.01.2014 | UK Tech
Dr Rachel O'Connell

On one side is the 'Internet Safety Industrial Complex' faction that includes representatives of companies that sell internet safety technologies, i.e. Internet filtering, monitoring and age verification technologies.

Free Virus Software: How to Protect Your Business on a Budget

Tommy Wyher | Posted 23.01.2014 | UK Tech
Tommy Wyher

Keeping your business running on a budget isn't always the easiest task. However, you can keep your business computer safe from viruses by using free virus protection software. There are a lot of options out there, so how do you know what is the best? Take a look at some of the top free virus protection software options for your business.

Privacy Climbs the Small Business Security Agenda

Mike Foreman | Posted 08.12.2013 | UK Tech
Mike Foreman

Any small business that thinks their modest size means they are not a target for cyber criminals only needs to look at the bigger picture. Taken together SMBs represent a substantial proportion of the market.

Cyber-blackmailers and Other Childhood Threats

David Emm | Posted 23.11.2013 | UK Tech
David Emm

Children are often more technically savvy than their parents but less worldly-wise and so typically less wary about sharing information or responding to suspicious messages. This is why it's so important for parents to involve themselves in their children's online activities from a very young age.

IT Security: Can You Really Rest Upon a Cloud?

Lee Mannion | Posted 19.11.2013 | UK Tech
Lee Mannion

In the pre-internet era, data security was essentially endless files filled with thousands of documents. It is hard to believe that there was a pre-internet way of doing business securely at all, or that any business that operated during those times is still going today. It must have been a head spinner to adapt to new technologies.

Post-Snowden, Encryption Remains Your Best Friend

Ian Emery | Posted 17.11.2013 | UK Tech
Ian Emery

Let's start by assuming that if state agencies really want to carry out surveillance of your systems they will. All you can do is make it less worth their while trying.

Is Modern Surveillance Really 'Orwellian'?

Jamie Bartlett | Posted 10.11.2013 | UK Politics
Jamie Bartlett

We need a much larger, open public debate to determine the balance between security and liberty in a digital age. But too many sensible opponents are disposed to calling surveillance measures 'Orwellian'... regular refrain to our most celebrated dystopian nightmare is not helpful.

Five Things You May Not Know About Teenagers and Privacy

Colin Strong | Posted 20.10.2013 | UK Tech
Colin Strong

Recent work by GfK suggests that teenagers do typically consider privacy to be important and will often go to great lengths to manage it effectively. Here are five key learnings...

Google's 'No Expectation Of Gmail Privacy' Quote Causes Outrage

Huffington Post UK | Posted 15.10.2013 | UK Tech

The tech world has reacted angrily to the suggestion made by Google that email users have "no legitimate expectation" of privacy when sending messages...

Troll Over - Four Ways to Stop Online Abuse

Simon Cohen | Posted 06.10.2013 | UK Tech
Simon Cohen

Online abuse is a complex issue with no easy answer, but we can all take steps to rid the world of trolls. First, stop using the word, and get real. Be compassionate, caring, and kind towards each other. Let's all live by the The Golden Rule of Twitter - tweet others as you would like to be tweeted yourself.

What is Privacy? A Legal Expert Tackles the Issue of Our Era

Shana Ting Lipton | Posted 18.09.2013 | UK
Shana Ting Lipton

When Edward Snowden revealed the existence of a widespread spying programme by the NSA, the public's response to the news of the privacy incursion was intriguingly divided. Some called the whistleblower a treasonous spy; others dubbed him a privacy crusader.

Should We Ask Our kids' Permission Before Posting Online?

Holly Seddon | Posted 07.09.2013 | UK Tech
Holly Seddon

I think the way we invade the private lives of others including our children have reached a point where we all need to step back for a moment and re-assess how we live as humans. On the one hand a comment about our children can be innocent enough as part of our daily social lives and conversations.

A Question of Trust: European Parliament Launches Inquiry Into US Surveillance of Europe

European Parliament Web Team | Posted 07.09.2013 | UK Politics
European Parliament Web Team

The revelations have shaken trust between the two traditional partners at a time when collaboration is more important than ever. Not only is a historic free-trade agreement at stake, but the two regions also need to work closely together on issues such as terrorism, the environment and promoting human rights and free trade.