What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the...
Internet hacks: What is a man-in-the-middle attack?
Man-in-the-middle attackers could intercept your data without your knowledge. Protect yourself with encryption and authentication.
OnionShare: Secure and anonymous file sharing
Our guide shows you how to install and use OnionShare for secure, anonymous file sharing and chats.
Guide to stronger passwords – Part 3 (diceware)
This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication)
Part 2...
Guide to stronger passwords, Part 1 (two-factor authentication)
Use two-factor authentication (2FA) to protect your accounts. Options include SMS codes, hardware keys, and authenticator apps.
Six big data security predictions for 2016
2015 was full of newsworthy cybersecurity breaches. Hackers revealed the names and credit card details of 33 million people...
How to stop the Kazakhstan government from intercepting your internet traffic
In mid 2019, internet users in Kazakhstan were issued with notices when they visited any HTTPS-encrypted websites, that warned...
Let’s make a deal: Russian hackers willing to compromise
Is this the new face of malware? According to a recent Geek article, instead of hiding behind a randomly-generated...
Is ransomware the greatest highway robber of the 21st century?
The days of a Dick Turpin type of character pulling you over on the side of the road and...
Encrypted chat apps, round two: Talk is cheap
We recently took a look at some of the most popular encrypted chat apps on the market, but as...