-
How to secure your iPhone, iPad, and other Apple devices
So you got a shiny new Apple device! While it’s not the most fun part of your acquisition, the first thing you should do is set up the built-in security features on your new iPhone, iPad, or Mac com...
-
The jargon-busting internet security technical glossary
Spim? Spam? Spit? Stop feeling overwhelmed by internet security jargon. Use this handy glossary to figure out what's what! Jump to... A B C D E F G H I J K L M N O P R S T U V W X Z A Access con...
-
Protect your financial privacy with Bitcoin: A comprehensive guide
Curious about Bitcoin and how it works? This comprehensive manual will explain how you can use Bitcoin to protect your financial privacy. After you've read this manual, be sure to check out the step-...
-
Ultimate guide to mobile security for iPhone and Android devices
While most of us know to be vigilant when it comes to the security of our desktops and laptops—installing antivirus programs and regularly scheduling system scans—our mobile phones often aren’t ...
-
The safe browsing guide: 21 ways to protect yourself online
Browsers are slowly replacing operating systems as the central interface for devices. Already, they are the primary application on most computers. Similar to how our smartphones have become our camera...
-
How to delete your hard drive browsing history
A common way to enhance your internet privacy is to delete your web browser’s history (see our guide for Chrome). Doing so helps safeguard your personal and financial data. But if you want to go one...
-
What is off-the-record messaging (OTR)?
For journalists, the ability to protect a source is vital to successfully communicating with valuable people. For sources, the stakes are even higher: their security and liberty depend on not being id...
-
How to set up and use Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) is the No. 1 trusted and tested encryption program. It can be used to encrypt text, files, emails, or entire disks. It was created in 1991 by Phil Zimmermann and was released...
-
The essential crypto glossary: Blockchain terminology explained
Bitcoin is big news, but many of us don't understand it. This crypto glossary explains the blockchain terminology you need to hold your own. 21 Symbolic number, as there can only ever be 21 million Bi...
-
Tech safety for survivors of domestic violence
Content warning: This guide discusses aspects of domestic violence and abuse. Domestic violence is about the abuse of power and control, which can take many forms. Often, technology can serve as a maj...