"We want to give you back your Facebook data.
data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal how machine learning algorithms use your data to gain insights about your personality."
"Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
"This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists."
World Data Atlas. World and regional statistics, national Data, maps, rankings. 370M+timeseries: 960+topics: 900+sources: Take a look at Data coverage matrix by country or topic to see the full picture!
'The Named Data Networking (NDN) project aims to develop a new Internet architecture that can capitalize on strengths - and address weaknesses - of the Internet's current host-based, point-to-point communication architecture in order to naturally accommodate emerging patterns of communication. By naming Data instead of their locations, NDN transforms Data into a first-class entity. The current Internet secures the Data container. NDN secures the contents, a design choice that decouples trust in Data from trust in hosts, enabling several radically scalable communication mechanisms such as automatic caching to optimize bandwidth.'
"Illumio delivers adaptive security that works across the largest data centers and cloud computing environments. Our customers gain live visibility, adaptive micro-segmentation, and instant encryption without dependencies on the network or hypervisor, and thus can run on all workloads across all environments."
'The New Cloud Atlas is a global effort to map each data place that makes up the cloud in an open and accountable way. We have set out to find and map each warehouse data centre, each internet exchange, each connecting cable and switch. Anything of any physical significance in the operation of the cloud should be observed is some way, and recorded for everyone to see and use.'
"Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can't get to the data unless you pay a ransom. However this is not guaranteed and you should never pay!"
"SAY HELLO TO XXL BOX CLOUD STORAGE
Your files - pictures - documents, anywhere! XXL Box breathes new life into secure Cloud Data Storage, Document Sharing, Collaboration and Backup"
With the HPI Identity Leak Checker, it is possible to check whether your e-mail address, along with other personal data (e.g. telephone number, date of birth or address), has been made public on the Internet where it can be misused for malicious purposes.
Freepto is a Linux-based operating system on USB stick. This means you can bring it with you and use any computer as it was your own. Also, data you save on the USB stick will always automatically be encrypted (i.e. nobody else will be able to access them).
"BrowserLeaks.com - It's all about Web Browser Fingerprinting. Here you will find the gallery of web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet."
The popularity of Cloud storage is increasing at a steady rate as we see more and more users moving data to the cloud. As per a recent survey, it was found that one out of five internet users have used Cloud to store data.