-
How to keep your messages private and anonymous
Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...
-
Tails 2.0 installation and review
This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...
-
Six big data security predictions for 2016
2015 was full of newsworthy cybersecurity breaches. Hackers revealed the names and credit card details of 33 million people who frequented the online-cheating website Ashley Madison. Researchers demon...
-
What would you give for free Wi-Fi? Probably more than you think
This post was originally published on January 13, 2016. What’s awesomer than free public Wi-Fi? When you find a free public Wi-Fi hotspot you probably think, “Awesome!” and connect to it without...
-
Use a VPN and save up to 50% on car rentals. We tried it!
This post was originally published on November 25, 2015. Frequent flyer? You can also use ExpressVPN to find cheaper airline tickets! When booking cars online, some car rental companies and price comp...
-
How Flash is used to destroy your computer
Some of the most common Web viruses are ones that affect your computer by tricking you into clicking on a specific website. In fact, a whole industry exists where hackers simply upload their software ...
-
Come to the dark web… it's a little safer now
The dark web has long been seen as the skeevy underbelly of the Internet where users can buy illegal drugs, steal people’s credit card information, and hire someone to “off” their neighbor. In r...
-
Hacktivism and vandalism were the main motivations for DDoS attacks last year
Distributed denial of service (DDoS) attacks are growing in size, frequency and complexity, according to the latest Annual Infrastructure Report from Arbor Networks. The security vendor’s 10th Annu...
-
No Wi-Fi, no problem: Hackers go low-tech to steal your data
This article was originally published on January 22, 2015. The risks of using an unprotected, unencrypted Wi-Fi network are well-documented. Anything you transmit becomes fair game for hackers — if ...
-
Internet Systems Consortium site hacked
This post was originally published on January 7, 2015. This week the Internet Systems Consortium site was hacked. Visitors to the site, which develops the BIND DNS, OpenReg, ISC AFTR and ISC DHCP t...