Privacy

Go back to Settings… Privacy settings… again. This time we’re going to look at Contact Information.

Remember, I didn’t put any of this information up, so they would be blank anyway. But if you do put up some personal information, compare yours to this list. You could have reason to share your information more widely.

Also, if you get into a situation where someone starts to annoy you, you can select to not allow any specific person from accessing any of this.

Go back to Settings… Privacy settings… again. This time we’re going to look at Contact Information.

Remember, I didn’t put any of this information up, so they would be blank anyway. But if you do put up some personal information, compare yours to this list. You could have reason to share your information more widely.

Also, if you get into a situation where someone starts to annoy you, you can select to not allow any specific person from accessing any of this.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.