We are surrounded with all sorts of registrations (social nets, e-shops), check-ins, and various social networks. Cookies and other tracking technologies are always awake, keeping their “eyes” on us. Once we put our info in, how many of us pay attention to data security, or how our data is processed, or who may be interested in it? Let’s jump into a world of IT hacks and tricks and find some secure strategies for data protection.
Also in this edition:
“Big Brother”: Snooping Barbie and Sniffing Ministry
6 Economics Books and You Will Never Be the Same Again
Basic Income: A Dream for Sluggards or Geniuses?
A True Story About Sharks
Support us!
All your donations will be used to pay the magazine’s journalists and to support the ongoing costs of maintaining the site.
Share this post
Interested in co-operating with us?
We are open to co-operation from writers and businesses alike. You can reach us on our email at [email protected]/[email protected] and we will get back to you as quick as we can.