-
Diceware passwords: How to create secure and memorable passphrases
Most people make passwords that are either too weak or too hard to remember. Diceware offers a solution for creating strong passwords that are easier to remember than random character strings, strikin...
-
How to encrypt your internet traffic and protect your privacy
Your internet traffic consists of a stream of data that travels between your device and the websites and services you use. Today, some of this data is encrypted by default, making it harder for potent...
-
Zero-trust data protection explained
For years, security relied on a castle-and-moat approach: keep outsiders out and trust whatever sits inside. Cloud services, remote work, bring-your-own-device (BYOD) policies, and the Internet of Thi...
-
Is AirDrop secure? What you need to know before using it
AirDrop is a useful tool for transferring files that’s built into most Apple devices, but it can also open you up to certain threats. Though there are protective measures in place, AirDrop could be ...
-
How to stop someone from mirroring your phone
Phone mirroring technology is very useful, but it’s also potentially dangerous. The ability to project photos or videos on a larger screen, like a TV, has obvious applications at home and at work. B...
-
SSH vs. VPN: Which should you use?
Whenever you connect to the internet, there’s a risk that your data could be exposed. To maintain privacy, many people turn to tools that protect their traffic. Two common options are setting up Sec...
-
Discord end-to-end encryption: Can you turn it on?
Discord is one of the most widely used chat platforms in the world. It’s popular not just with gamers but with all kinds of online communities. That said, using Discord comes with some trade-offs. T...
-
VPN vs. firewall: Key differences and when to use each
Virtual private networks (VPNs) and firewalls are both tools that can help you maintain your security and privacy in the face of web-based threats. That said, they work in fundamentally different ways...
-
What is quantum encryption? How it works and why it matters
As the age of quantum computers approaches, it brings both exciting opportunities and new challenges for consumer technology. One is that quantum computing has the potential to break otherwise solid e...
-
PPPoE vs DHCP: Which should you use?
Point-to-Point Protocol over Ethernet (PPPoE) and Dynamic Host Configuration Protocol (DHCP) are the two most common methods for establishing and managing internet connections, but they operate in ver...