This way you can monitor your privacy in the Metaverse
In early 2022, the first marriage took place in the Metaverse. The American couple Ryan and Candice Hurley tied the...
The difference between the surface, deep web, and the dark web
For years, the internet has been our rock. What’s funny is that we can compare the internet to a rock. Well, with...
Protect yourself against a cyber war
When you think of war, you probably think of soldiers fighting on the battlefield, large tanks driving around, and...
This way you can protect your biometric data
Biometrics is a hot topic in spy movies. Doors open with an iris scan and confidential information is locked with voice...
This way you can protect yourself against deep fakes
In recent years, the statement “seeing is believing” has been replaced by the statement “nothing is what it...
30 days reflection period
BUY NOWThis way you can use the internet anonymously
The internet is the place to be these days. You watch all your favorite films and series and take a quick look at your...
Apply multi-factor authentication to your accounts
Multifactor authentication is indispensable for your digital security. Strong passwords are not always sufficient to...
Risks associated with online banking
We can hardly live without it: online banking. Handy that you can transfer an account in a few seconds, quickly check...
What is TOR and is it safe to use TOR?
You may have heard of it: TOR. It is an abbreviation for The Onion Router. What kind of weird name is this? We hear you...
Here’s how to protect yourself from identity fraud
Little by little, criminals get their hands on more and more puzzle pieces with information about you. Until one day...
Using public WiFi on the train
Monday, March 29, 2010, an NS intercity train left at 2:30 p.m. from Amsterdam Bijlmer ArenA to Leiden. This train trip...