Category: VPN Series

Home / Category: VPN Series

Are you using the same password everywhere?

December 17, 2019 | VPN Series | No Comments

Data breaches are happening everywhere, in fact, world top companies such as Facebook, yahoo have been victims of these attacks. One of the main reasons behind such data breach is using the same password on every single site. When the digital attacker steals the information from one unsecured site, he can take the information of various accounts and personal details. There is no way to stop that hacker from using the same password on other sites.

No matter how strong the password is, within the security standards (numbers, random letters, symbols, etc.). Using it everywhere on different secured and unsecured sites can be dangerous and result in stolen information and data.

So how to go about it? Let’s check it out

1. Two Factor authentication

Two-Factor authentication, as the name suggests, is the security measure supported by two different authentication factors to protect the user credentials and information. It is also called dual-factor authentication or two-step verification. It is the updated version of single-factor authentication in which one factor is provided such as passcode or password. In two-factor authentication, two different factors are supported such as security token, biometric, fingerprint or facial recognition, etc.

It is very helpful in protecting the personal data as it provides an additional level of security and making it harder for attackers to steal the data. It is an important and effective tool to protect the data and provide the security to personal, financial, confidential information.

2. Choose a strong password

Using an ordinary password that is easy to guess poses a great risk of online theft or hacking. People tend to use “123456” or their “own name” as a password. This is surprising to see people doing such risky stuff without even knowing about it. Many websites have now kept the requirement to make a password strong by using one upper case, letters, numbers and symbols. Keeping a strong password would help you to save data and information from any hacker.

3. Use multi-factor authentication

Many online networking and business sites such as Gmail, outlook, online bank accounts contain personal and sensitive information of the user. To protect such data, they have opted for multi-factor authentication to provide better security measures. A code is sent to the user registered mobile number before logging in to the account. This is the updated version of two-factor authentication to protect the data. It is advisable to opt for multi-factor authentication for better security measures.

4. Choose different passwords for every account

Choosing the same password for every account might be easy to remember and login but it gets easier for hackers to hack all your accounts using the same password. If you regularly login into different sites and can’t remember different passwords then next option might be the best choice for you

5. Get a password manager

The password manager will keep track of all your user name and password while improving security. It will save a lot of your time by automatically filling the username and password. It will also synchronize your password into different devices means you will be only logged in from your registered device.

6. Opt for biometric

Biometric is getting popular all over the world because of its high security and fast use. Many smartphones now have fingerprint option for better security measures. Even mobile users these days prefer to login through fingerprint than typing long passwords. It’s faster, less time consuming and boost productivity at the time of logging into any important work document. Moreover, it provides high security because it gets really hard for any hacker to copy fingerprint and hack the personal information.
“Prevention is better than cure” is a popular saying, not only this applies in medical but also in the IT world. Hackers are getting smart day by day. With the new technologies coming up every day, hackers have discovered new ways of stealing data and personal information. To save yourself from data breach, you should use the above different methods and protect your data. It’s never too late to upgrade your security so hurry up now!

TikTok has recently been accused of harvesting huge amounts of user data of personally identifiable nature, and sending them to China. Popular VPN service BitVPN, however, informed that all its users are absolutely safe because of its decentralized data structure.

A popular app for creating and sharing short lip-sync, comedy, and talent videos, TikTok has recently hit the headlines for wrong reasons. It has been alleged that TikTok has been involved in illegal harvesting of personally identifiable user data and sending those data to China. Along with TikTok, its Chinese parent company ByteDance has also been accused of having privacy policies that are ambiguous and taking user content without their consent.

The allegation of breach of user data privacy against TikTok is nothing new as similar charges have been brought against several industry heavyweights in the recent years. This growing trend is certainly an alarming symptom for millions of internet users all over the world. When it comes to protecting personal information, experts suggest app users to take adequate preventive measures, rather than relying too much on the data management policies of the service being used. This is where using a VPN service can make all the difference.

A decentralized VPN service on blockchain, BitVPN is currently one of the most trusted options for the ultimate internet privacy solution. BitVPN protects users from data breaches and cyber attacks with its layers of data encryption and scrambling in a decentralized VPN network. The decentralized structure of BitVPN makes it possible for the users to regain their internet privacy and stay invisible from all kinds of surveillance and censorship. As a result of VPN nodes spread across the world, its decentralized network lasts forever and allows users to bypass firewalls and geo-restrictions.
Some other key features of BitVPN include
• Users can remain hidden and protected even when connected to public Wi-Fi.
• As a result of decentralization, BitVPN cannot access, track, or store the online activities of its users
• All data is generated and distributed amongst users.
• Single points of attack or failure pose no risk at all to the users.
“Following the recent developments related to TikTok, we would like to reassure all our users around that world that they have nothing to worry about,” said Steve, the founder/CEO of BitVPN. “Owing to our decentralized system architecture and layers of data encryption, all of you are free to enjoy the internet just the way you like. We have always been and would remain committed to providing the highest level of data security to our users. So, stop worrying and happy surfing to all of you!”

To find out more, please visit https://www.bitvpn.net/
About BitVPN: BitVPN is a decentralized VPN service on blockchain offering the ultimate internet privacy solution and ensuring an anonymous online browsing experience for the users. With BitVPN’s decentralized data structure, users can surf, unblock, and stream any content anonymously wherever they are. With layers of data encryption and scrambling in a decentralized VPN network, BitVPN protects users from data breaches and cyber attacks.

How to Delete Temporary Files?

December 4, 2019 | VPN Series | No Comments

As known as a foo file, a temp or temporary file is generated for temporarily holding information during the creation of a file. These files are used for the purpose of recovering data lost because of a program or system outage.
If you are an avid internet user, you are probably aware of the importance of deleting temporary internet files. Occasional removal of these files is highly recommended for all internet users. It is possible to delete temporary internet files either via the control panel of the computer or through your web browser.

What are Temporary Files?

A temporary file may be defined as an internet file created by the operating system of the computer for various types of temporary purposes. While using programs or applications, temporary files are required because it demands additional storage to accommodate existing file usage and extra memory.
Temporary files are often created while running programs that consume a significant amount of data. As an example, temporary files will be created by your computer to store and save information, if you use video, graphics, or media editing software. The same applies to programs such as Microsoft PowerPoint or Word. While using these applications, all the work performed gets saved in frequent intervals. If the program shuts down suddenly, the users have the option to restore their work with the help of temporary files.

Why Should I Remove Temporary Files?

Over a period of time, computer systems tend to accumulate loads of temporary files through different programs and apps. Once their tasks are complete, they remain idle on the system. This not only occupies the computer’s storage space, but also results in slowing the system down.
There are many different reasons for regularly cleaning the temporary files in your computer.
• Presence of a lot of temporary files hinders the performance of the system. Cleaning them up on a regular basis will improve system performance significantly.
• By cleaning up the temporary files, it is possible to instantly recover a lot of disc space.
• Old temporary files can also lead to sudden app crash or slowness in loading a program.
• It is possible for the hackers to infect a whole system by attacking the old temporary files on the system.
• The app loading time of the system improves significantly by deleting the temporary files.

How to Delete Temporary Files on Windows 10?

If you are using Windows 10, there are a number of ways to remove temporary files. The Settings app can be used to remove them manually as well as automatically. Depending on the release used, the steps can be slightly different.
For the users of Windows 10 version 1903 or later, the procedure involves clicking on system, followed by storage, local disk, and temporary files option. Finally, select all the temporary files you want to remove and click on the button “remove files.” For Windows 10 version 1809 or earlier, the steps include opening settings, clicking on system, storage, and the link free up space now, selecting the files to delete, and clicking the button “remove files.”
If you choose to remove temporary files via your browser, the process may vary across browsers. In general, you will have to go to the ‘Settings’ and select “Internet Options.” This is where you will find the option to clear cookies and temporary files. If you want to delete temporary files via your control panel, you need to select “Network and Internet” after visiting the control panel. The option to “delete browsing history and cookies” will be available under “Internet Options.”

How to Delete Temporary Files on Mac OS?

Mentioned below are the steps involved in deleting temporary files in Mac OS. Before starting this manual procedure, create a backup folder to safeguard the system.
• Shut down all apps running on the system.
• Select “Go” menu in the Mac Finder or use shortcuts such as Shift key or Option/ Alt.
• Choose the library option and click on the “caches” folder.
• Select all the files you want to remove and put them on trash.
• Finally, remove everything from the trash.
If you want to delete your system data while using Mac, all you have to do is just restart your Mac.

How Online Shopping Could be Unsafe ?

November 29, 2019 | VPN Series | 1 Comment

There is no denying the fact that online shopping makes our lives easier in many different ways. However, at the same time, it can be extremely unsafe under certain circumstances. If you are a big fan of online shopping, please be mindful of the fact that numerous fraudsters and scammers are extremely active in the digital realm to steal your hard earned money.
Mentioned below are some of the most common risks associated with online shopping.
Identity Theft: This involves getting hold of the personal information of a shopper and using that information for the purpose of making personal purchases. There are many different ways of stealing personal information online such as phishing, installing spy apps, etc.
Scams and Email Links: Scammers also send emails that may look like innocuous communication from a trusted online store or bank. These emails may ask you to click on a link to claim an attractive discount or free products. However, these are forgeries and you can fall prey to it just by clicking on the link.
Credit Card Fraud: Malicious users can also intercept the payment portal of an online store. When this happens, instead of the legitimate payment gateway, the shoppers are diverted to the site of the malicious users. This is how the fraudsters can gain access to your credit card details.
Some other common threats include adware and malware, fake online stores, cloned websites, fake charities, etc.

How to Stay Safe when Shopping Online?

Luckily, there are many ways to shop online without any or minimum risk. Mentioned below are some points to take into account.
Look for HTTPS for Shopping Online:
• While making any purchase online, make sure that the website URL of the store starts with HTTPS, not HTPP. This additional S means that your data is sent in a secure manner. A website starting with HTTPS utilizes Secure Sockets Layer to encrypt the information so that it can only be seen by the intended recipient. However, this safety feature is not available with HTPP websites.
Never Shop on Public Wi-Fi:
• While using a public network, entering any personal information is like sending out an invitation to the fraudsters. Data encryption feature is not available with most of the Wi-Fi hotspots. Therefore, with the right kind of software, it is simple to intercept any information shared over these networks.
Check your Credit Card Statement Frequently:
• The smartest way to shop online is to use a credit card. Under the Fair Credit Billing Act, the card issuers are liable to reimburse their customers for fraudulent charges. Therefore, keep checking your card statement frequently, and report the company if you notice anything suspicious.
Some other useful precautions include updating the browser regularly, not clicking on suspicious links or emails, changing passwords regularly, and using virtual credit card numbers.

How to Save Money while Shopping Online

If you are smart enough as a shopper, there are different ways to save your hard earned money while shopping online.
Compare across Sites: Anyone who shops online knows very well that same product is sold by different online shops at different prices. To avoid overpaying, you may install any of the available browser add-ons. These tools are capable of automatically generating a smart chart comprising of the prices of a given product across many different online platforms.
Use a VPN to Find Better Deals Online: We may not realize, but online stores often treat customers based on whatever information they discover about them. By using a VPN, it is actually possible to save money by finding out the best online deals while remaining secure. Before starting a new search, don’t forget to clear the cookies.
Leave Items in Your Cart: Add items you need in the cart and do nothing for the next few days. Most online shops hate seeing stuffs in the shopping cart, and may come up with special discounts or coupons for you.

What are Cookies?

November 26, 2019 | VPN Series | 1 Comment

A cookie may be defined as a small file stored on a computer, capable of holding a moderate amount of data related to a particular website or user. As a result of the presence of cookies, the server is able to deliver pages custom designed for specific users.
Technically speaking, cookies are effectively small lookup tables comprising of pairs of values. Creating cookies is a very convenient alternative to carry information across sessions on a website or related websites without having to store massive amounts of data in the server. If cookies are disabled by the user, the write operation will not work and the subsequent sites relying on cookies will prompt the user to enter the information once again or take a default action.

Computer cookies can be divided into three categories viz. session, persistent, and third-party cookies.
Session Cookies:
• These are temporary cookies capable of memorizing the online activities of the users. Online shopping is one particular example where sessions cookies are extremely useful. While shopping online, we can store our favorite items in the cart and check-out at a later stage. This is possible because all our activities within the platform are tracked by session cookies. These cookies also remember our actions to help us maneuver through the internet.
Persistent Cookies:
• Also known as first-party cookies, the function of these cookies is to track the online preferences of the users. While visiting a website, if the visitor chooses to personalize the site based on his or her preferences, those preferences are remembered by the persistent cookies and implemented during their next visit to the website.
Third-party Cookies:
• Third-party or tracking cookies are used to collect information based on the online behavior of a user. Whenever we visit a website, various types of data are collected by the third-party cookies. Later on, this information is sold or passed on to the advertisers by the websites creating the cookies.

How to Clean Cookies?

Most of the modern day web browsers allow users to delete cookies without any issues whatsoever. Please follow the steps mentioned below, depending on the browser you are using.
• Google Chrome: Click the menu—select ‘more tools’— and click ‘clear browsing data.’
• Firefox: Select the Firefox menu—go to ‘Options’— select ‘Privacy & Security’—scroll to ‘Cookies and Site Data’— select the ‘Clear Data’ option.
• Safari: Go to Safari menu— select ‘Preferences’—click on ‘Privacy’—select the option to ‘Block all cookies.’
Though it is possible to turn off cookies with all web browsers, please note that turning them off altogether may not be right approach because it will lead to improper functioning of certain websites. The best approach from a user’s perspective is to block only the third party cookies. This will not affect your user experience because the functional cookies required by the websites will still be present, and these cookies are typically harmless in nature.

How long does a Cookie Last?

The lifespan of the cookies is generally set while creating them. The cookies are destroyed by default as soon as the user closes the current browser window.Session cookies only exist as long as the browser is open. However, the persistent cookies can survive even after the closure of the browser or the app. When you re-open your app or browser, these cookies are used again to recognize your computer.

Do Cookies Cause Any Harm?

Cookies themselves aren’t capable of causing any harm because the data contained in them can’t be changed. Also, cookies are not capable of infecting our computers with viruses or any other types of malware. However, some cyber attacks can directly access the browsing sessions of the users by hijacking cookies. Therefore, the biggest threat from cookies comes in the form of their individual browsing history tracking. Ad serving is also a concern for the internet users for sure.
As we have already discussed, there are primarily two types of cookies based on their functionality. The first kind helps different websites function optimally and the other types is used for ad tracking and monetization. There is no doubt that the website-enhancing features of cookies will continue to be used in the days to come. However, the privacy threats cause by the cookies must be addressed adequately.

How to Get Internet Access In Iran?

November 22, 2019 | VPN Series | 20 Comments

Following the recent protests over a sharp increase in fuel prices, the Iranian authorities decided to enforce a nationwide internet shutdown on last Saturday. As the internet blackout approaches a week, the incident has already triggered widespread concern all over the world. The internet shutdown has been particularly disturbing for the Iranians living or travelling abroad as they have remained cut off from their families and friends back home since almost a week.
“Like most Iranians, we have a family WhatsApp group. My grandmother, when she gets up for her morning prayers at around 5 am, always starts the day by wishing us a good morning “under the care of God.” The group has now been silent for 3 days and it eats me from the inside,” mentions an Iranian living abroad.
Technically speaking, the term internet blackout refers to a situation where the people of a country or region are restricted from using the internet. This is enforced mostly by the authorities in response to an emergency situation or socio-political unrest with the intention of preventing the sharing of information with the outside world. In countries such as Iran, authorities have strict control over the traditional media and the use of the internet is often considered to be threat for the authorities.
In today’s perspective, an internet blackout can have an extremely devastating impact on common people. One of the best ways to bypass an internet shutdown is to use a VPN. Renowned VPN service provider BitVPN has stood in solidarity with the Iranian people at this crisis period and has been helping them go online by masking the location of the users.
“Using a VPN will make sure your data cannot be read by the government. A VPN will also let you bypass the restrictions set by the government. During the partial shutdown, access to the international internet has been cut off. But when you use a reliable VPN such as BitVPN, you’ll be able to visit the internet again.” said a spokesperson from BitVPN.
“BitVPN has always been a proponent of internet freedom.This’s why we are offering extra traffic to them for completely free so that they would be able to communicate and spread their words out. Just open BitVPN and connect it, you will be able to go online right away.” the spokesperson added.
To find out more, please visit https://www.bitvpn.net/

What is Cryptojacking?

November 22, 2019 | VPN Series | 15 Comments

Cryptocurrency may be defined as an internet-based exchange medium that conducts financial transactions utilizing cryptographical functions. Leveraging the blockchain technology, cryptocurrencies offers several benefits including transparency, decentralization, and immutability.
The most important feature of cryptocurrencies is that they are beyond the control of any central authority. Unlike the fiat currencies, their decentralized nature makes cryptocurrencies immune to all types of external control and interference.
Cryptocurrencies can be exchanged directly between two parties by making use of private as well as public keys. Most importantly, these transactions can be carried out by paying minimal processing fees. This is another important benefit of cryptocurrencies, compared to the steep fees charged by most of the traditional financial institutions.

What is Cryptojacking?

Cryptojacking refers to the process of using someone else’s computer in an unauthorized manner to mine cryptocurrency. This is done by the hackers mostly by loading a cryptomining code on the target computer by having its owner click on a malicious link sent via an email. This can also be done by infecting an online ad or a website with JavaScript code. Once loaded in the browser of the victim, this code can auto-execute.
Regardless of how cryptojacking is done, the unsuspecting victims generally have no clue and continue using their computers normally. However, the cryptomining code continues its work silently in the background. Lags in execution or slow performance are the only signs the victim may notice.
It is not possible to find out exactly how much cryptocurrency is mined by this process. However, there is no denying the fact that this is a rampant practice these days in the crypto community. The popularity of cryptojacking is increasing amongst the hackers because this provides them an opportunity to earn more money for almost no risk.

How Prevalent is Cryptojacking?

Though it is relatively new, cryptojacking has quickly emerged as one of the most common online threats. Leading security experts around the world have identified it as the next big thing, as far as security threat landscape is concerned. In the recent days, the cryptojackers have become even more efficient, invading more and more powerful hardware.
It has also been observed that cryptojacking is more prevalent in personal devices. This is probably because it is more convenient to steal smaller amounts from numerous devices and accumulate a large sum. Also, it has been seen that the offenders are now more interested in cryptojacking compared to ransomware because the returns are higher and the risk is much lower.

How Does Cryptojacking Work?

As briefly mentioned earlier, there are primarily two ways of cryptojacking. In the first one, the victims are tricked by certain phishing-like tactics to load cryptomining codes in their computers. This is done by sending an email and encouraging the victims to click on a link. This link places a cryptomining script on the system by running a code.
The other technique involves injecting a script on an ad or a website. The script executes automatically as soon as the infected ads pop up in the browser of the victim or when the website is visited by the victim. Interestingly, no codes are ever stored in the computers of the victims. Regardless of the technique used, complex mathematical problems are run by the code on the computer of the victim and the results are sent to a server controlled by the hacker. In some instances, to maximize their returns, the hackers tend to use both methods.

How to Prevent Cryptojacking?

Mentioned below are some of the steps you can initiate to reduce the risk of cryptojacking on your computer.
• Installation of an anti-cryptomining or ad-blocking extension on your web browser
• Start using endpoint protection software that can detect certain known crypto miners.
• Pay proper attention to maintaining your browser extensions
• Ensure that all your web filtering tools are up to date.

Unlocking Vs. Jailbreaking

November 7, 2019 | VPN Series | No Comments

Unlocking and jailbreaking are two terms used frequently these days by many mobile phone users. However, these individuals have a lot of confusion with regards to the exact meaning of these terms. It is important to remember that these two are completely different things, though both relate to the usage of modern-day mobile devices.

What is Unlocking?

Unlocking refers to the process of carrier restriction removal with the intention of using a phone on any carrier. This involves eliminating a modem’s SIM restrictions so that the user can opt for any carrier on his or her iPhone.
Unlocking of iPhones can be divided into two types. In the first, the unlocking of the device is done using a software. The second alternative to unlock involves making modifications to the actual hardware of the device. In general, software unlocks are a much safer alternative because it does not modify the device in any way. Also, software unlocked phones can be reverted back to their original states, if required. There are many safe unlocking software available for free. On the other hand, hardware unlocks usually cost money. Moreover, unlocking phones using a hardware can be a tricky process.

What is Jailbreaking?

Jailbreaking is a process of modifying an iPhone’s firmware so that the user can access files that are restricted by Apple. This involves running unsigned codes and adding unofficial application installers to the device. Jailbreaking allows the device user to download numerous third party applications that were not available previously.

What are the Advantages and Disadvantages of Unlocking?

Unlocked phones are extremely on-demand these days because they offer several advantages to the users.
• Users can continue to use the same mobile device even after switching networks.
• While traveling abroad, unlocked phones make it possible to temporarily use local phone services.
Please note that there are also certain disadvantages of unlocking a phone. The most serious disadvantage is that the buyers are required to pay the full price of an unlocked phone up front. Also, please note that unlocking involves making certain changes to the device. At times, these changes may be beyond the original specification of the manufacturer. This may void the warranty of the phone.

What are the Advantages and Disadvantages of Jailbreaking?

Several limitations are imposed by Apple on its devices and therefore, the temptation to jailbreak these devices can sometimes be difficult to resist because of the following advantages.
• Using apps from all compatible stores
• Customizing a phone’s user interface in ways iOS doesn’t normally allow
• Performing activities that are usually Wi-Fi dependent
• Editing documents and viewing them offline using MS Word or Excel.
However, there are also several reasons to avoid jailbreaking.
• Stability and safety of the device is not guaranteed.
• iOS updates on jailbroken devices are generally delayed
• Immediately voids warranty on the device
• The process requires some technical knowledge.

Is it Safe to Unlock or Jailbreak a Phone?

Please note that both unlocking and jailbreaking are not illegal in most countries around the world. However, depending on the process followed, both these practices may be dangerous because connecting any mobile device to a third-party software or machine involves the risk of altering the settings responsible for the usability of the device.

How to Choose Good Security Questions?

October 31, 2019 | VPN Series | No Comments

Security questions are an integral component of safe internet usage that serves as a back-up measure to authenticate an application or website’s user, in case the user is not able to remember his or her password and/or username. Along with their respective answers, the security questions function as important pieces of information that are used frequently for the verification of account ownership. Security questions also provide an alternative to identify the users of an online service, in case they forget the password or try to log in from an unfamiliar location or device.

What Makes a Good Security Question?

A good security question is one that allows users to authenticate themselves without having to worry about the infiltration of their account. Creating a security is question is easy, but there are certain points that you must remember to ensure the safety of your account.
• Firstly, the answer to your security question should not be searchable on the internet or guessed. For example, if your security question is related to the country where you were born, it is not safe enough because this information is easily available online.
• Always opt for a security question that you can answer easily and not likely to forget over a period of time. One such example can be the city where your parents met for the first time or the name of your first basketball coach. These details are remembered by most individuals throughout their lives, but can’t be guessed by others.
• Please make sure that your question is simple, and can be answered precisely without any confusion whatsoever. Therefore, it is not advisable to create a security question that just asks when your anniversary is. Instead, the question should specifically ask the day and month of the anniversary. (“What day and month is your anniversary?)
• Stability is another criterion for you to consider. This means that the answer to your security question should be fixed, without any chance of changing in the future. This is why you should never create questions related to your favorite song or office address. Instead, create something around your oldest cousin’s middle name or the name of your first crush in college.
• It is always more difficult to answer questions with multiple probable answers. Therefore, this is one of the critical qualities of a good security question. For example, a question related to the middle name of your first ever class teacher is a good one because there can be many possible answers.

What Kind of Security Questions Should You Avoid?

As we discussed earlier, any security question that is unstable, can be guessed or researched online should be avoided. Mentioned below are some typical examples of poor security questions.
• Which sport did you like the most in schooldays? – This is a poor question because most of us do reveal these details through our social media profiles.
• In which city was your first job? – Finding out this information is cakewalk, particularly if you have a LinkedIn account.
• Which primary school did you attend? – Again, this can also be found out from social media platforms.
• What is your favorite song? This is not a good question because the answer is inconsistent as it may change over time.
So, now you understand the difference between good and bad security questions, and how a robust security question can help protect your online security. To conclude this discussion, remember that safe internet usage is a lifestyle choice and security questions are just a part of it. Therefore, your security passwords will only keep you safe, if you follow adequate security measures to back them up.

How to Stay More Private on Social Media

October 30, 2019 | VPN Series | No Comments

We live in a social world where we can share the most important events of our lives with just about anyone with a social media presence. Whether you like it or not, this world comprises of your friends, family members, ex, your boss, and loads of people you don’t even know. Whatever we post on our social networks becomes a part of our digital footprint.
There is no denying the fact that the advent of social media has made our lives better in many different ways. However, it also makes different aspects of your life accessible to people you don’t intend to share them with. For example, you surely don’t want your boss to know how you spent your last vacation.

What can People find out from Your Social Media?

Using social media does expose our personal information to people we may or may not be familiar with. Most of our favorite social networking platforms have expanded their range of social interactions by allowing us to share files, pictures, messages, and even our current locations. Unfortunately, all these and much more about an individual can be revealed via his or her social media account.
• All social media platforms ask for a good deal of personal information while creating an account. Some of these personal details include date of birth, contact phone numbers, address, details of family members, education, employment history, sexual orientation, etc.
• Location of the users is also be revealed by social networks through a process known geo-tagging. This reveals the location of an individual while creating an update or uploading an image.
• Once you post a status update on Facebook or Twitter, it can be seen by anyone on the internet, if the default settings are activated.
• While sharing photos and videos on social media, you may end up unintentionally revealing a lot of information. Some of the advanced cameras can embed metadata tags, revealing location, time, and date of the photo.
• Some of the instant chatting tools tend to reveal the identity of the persons involved in the chat as well as the subject of their chat.

Tips to Safely Use Social Media:

• Please ensure that your email addresses and phone numbers are hidden from public view in your social accounts. For Facebook, adjust the privacy settings so that only your friends can view your posts. In Twitter, don’t forget to uncheck the ‘Discoverability’ boxes.
• If you are using social media via apps, hide your activity status so that no one can see whether you are online or offline.
• Read receipt notifications convey to your contacts that you have read their messages. Turning off these notifications can further protect your privacy on social media apps.
• Always try to remain discreet about your whereabouts such as current location, vacation plans, etc.
• Avoid the games and quizzes that require access to your profile information.
• Try to limit your audience in social media by choosing who can view your updates and post. Avoid accepting friend requests from people that are unknown to you in real life.
• Always use an updated version of your security software.