Privacy: Why we ignore Password Best Practices
Nowadays, passwords are an easy target for hackers. There’s a precise collision between what are the best practices of password management and reality. If we …
Making your life easier with automation
The other section is where I’ll include posts that don’t fit the categories defined, but I think they can bring some added value to you. Currently, you can find Privacy articles, but other areas will come in the future.
Nowadays, passwords are an easy target for hackers. There’s a precise collision between what are the best practices of password management and reality. If we …
When it comes to time drains, dealing with email is always at the top of the list. We all receive way too many emails, and …
If you’re not aware of what two-factor authentication (also known as multi-factor authentication) is, here is the super-simplified explanation. It’s is an extra layer of security …
Today we finish what we started yesterday and provide examples on how to form new habits. This article is the follow-up from yesterday’s article, so …
The end of the year is time to stop and reflect on what happened, good or bad, and plan for next year. Also, is the …
We get a lot of information pushed at us daily. I won’t even debate here the number of notifications that some people have enabled. It …
Earlier this week, my friend Miguel Velosa Câmara showed me the following tweet: Government-backed attackers may be trying to steal my Google password. This is …
Ok, I’ll start by admitting that the title looks a little bit clickbait but hear me out. How many times you’re using a computer, especially …
For all of us who were not aware of what Superhuman is, let’s investigate together and understand why there’s a huge controversy around the privacy …
The Guardian published this news recently, and it was not good for Apple. Although Apple does not explicitly disclose it in its consumer-facing privacy documentation, …