18-36 Segment 2: Privacy Online

Thanks to online shopping, internet banks and social media, our information has never been more vulnerable to theft. We explore what exactly is in all of those privacy agreements we often agree to without reading, and how we can try to reclaim our privacy in a digital world.

hacker programing in technology enviroment with cyber icons and symbols

16-37 Segment 1: Cyber Security and Restoring Reputations

Our guests discuss how gossip websites operate and how to protect yourself from false and embarrassing information that appears online.