Skip to content

How easy is it to get hacked?

The Good, The Bad, & The Outright Evil

THE GOOD APPLE

Eating an apple daily can provide various health benefits, but it does not guarantee prevention of illness. A balanced diet and regular medical check-ups are important for overall health. While looking to keep data privacy doctors away, an Unhinged Privacy Extremist got their hands on Apple’s latest iPhone 14 Pro that seems to be causing quite a stir! The user reported feeling angry about the Activity Tracking Report results from their new iPhone 14 Pro.

They claimed to have shut down every data collection and sharing setting as soon as they got the device, but still found the results to be excessive. They felt uncomfortable with the size of the front and back cameras, with the Health app granting itself permission to activate the microphone. They couldn’t help expressing concerns over the length of the report generated after only four days of usage with one app and one contact added. The user concluded that the iPhone 14 Pro was creepy and invasive of their privacy, and suggested that Apple should reconsider its data collection practices.

Their discontent culminated in a Privacy & Equity Virtual Conference featuring Data Privacy Professionals from all over the world. You can watch it below.

THE BAD SOCIAL ENGINEER

Most people underestimate how easy it is to get hacked but as this video proves, all a social engineer needs is a 2 minute call with a service provider you trust.

THE OUTRIGHT EVIL

Big technology companies collect vast amounts of personal data from their users, including sensitive information like financial transactions, search histories, and location data. This data can be used for targeted advertising, as well as sold to third parties. Additionally, technology companies often share data with government agencies for national security purposes, which can result in privacy violations.

What you can do about it?

Cyber Threats: How To Protect Yourself | Centralization Vs Decentralization | Cybersecurity

To safeguard themselves against these privacy violations and cyber attacks, individuals can take the following steps: 

    1. Use strong, unique passwords, And change them regularly, at least once every 4 months.
    2. Enable two-factor authentication, like SMS, an OTP or Authenticator App.
    3. Share less personal information online. Don’t let your good nature be your undoing.
    4. Keep software and security systems up to date, and
    5. Use encrypted messaging and storage services that put you in control of your data, like BioKeyPer and Biokeeper App

    Take back your privacy

    As our physical world becomes more connected to the digital world, the effects of cyber attacks on our safety will become even bigger. BioKeyPer eliminates the need for you to trust a third party by putting your privacy in your own hands on a data vault you can take home.

    Commit $10 today to add your order to the first production batch & reserve a 50% discount.

    Leave a Reply

    Your email address will not be published. Required fields are marked *