3

Self-Destructing Cookies — Silently Dispose Of All Those Unwanted Cookies

Self Destructing Cookies is a Firefox add-on that automatically removes cookies when they are no longer used by open browser tabs. I’ve found this to be an excellent solution that works silently in the background. Websites will only be permitted to identify you while you actually use them and can not stalk you across the entire web. This is the …

Two New Privacy-Friendly Services

Trezor is a safe for storing bitcoins. This USB device creates an isolated environment for offline Bitcoin transaction signing.

4

What A Website Knows About You

All the cool web sites you visit need to know the properties of your “user agent” (in today’s environment it is your web browser) in order to optimize the views and transactions of the pages you visit on your device. This information (browser and version, operating system and version, etc.) is provided to the web site in the user agent …

1

Using Firefox’s Reader View To Remove Web Clutter

The Firefox browser has a useful feature called “Reader View” which strips away clutter like buttons, ads and background images. It also adjusts the page’s text size, contrast and layout for better readability. You can find the Reader View button here: Here is an article from Reuters as it appears in Page View Mode: There is also a Firefox extension …

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

2

Malware: The State Of The Threat In 2016

Most malware is acquired when users visit questionable web sites (e.g. adult sites) or when they click on questionable email (e.g. free offers or fake invoices). MS Windows is by far the most vulnerable operating system — but malware exists for Apple OS X and Linux also. You can significantly reduce your risk of a malware attack by keeping your OS, web browser and applications updated diligently.

VPN News and Updates

ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations. NordVPN has added 11 new servers. This company has a stringent no-logs policy, great speeds and reliable service. It is based in Panama. See our full review. PandaPow has released …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

UsenetBucket Now Accepts WebMoney, Alipay, UnionPay & Dotpay

UsenetBucket is a Usenet provider from Netherlands that is sourced from XSNews (an independent Usenet feed). The service has integrated 70 new payment methods — to better support international customers. You can use these payment methods by selecting “Other local payment methods” during the order process. You’ll be redirected to the payment page and the local payment methods for you …

2

Encryption 101: Which Encryption Type is Most Secure?

Apple’s recent revelation about a U.S. government order to create a “backdoor” for undermining iPhone encryption will leave lots of people wondering which encryption methods are reliable. Here’s a quick run-down of which encryption algorithms to trust, and which ones are flawed. First, you should understand that there are three basic ways that encryption can be broken: Keys can be …

Smart TV Privacy: How to Disable TV Data Collection

You knew that websites can track you. But did you know your smart TV is probably doing the same thing? Most modern TVs are designed to monitor what you watch and report that information to companies. Fortunately, you can protect your privacy while watching TV. Here’s how to disable monitoring software on smart TVs. The exact type of information that …

New Encryption Attack Can Steal Android and iOS Data

The newest threat to data privacy on mobile devices enables attackers to break the encryption keys of data stored on Android phones and tablets and iPhones. That’s according to recently published academic research. As the Register reports, the attack involves using a probe to collect a phone or tablet’s electromagnetic emissions while it is encrypting or decrypting data. The probe …

How to Check Websites for HTTPS and SSL Privacy Problems

Recently, a string of attacks against SSL encryption have undercut HTTPS privacy on the Internet. Want to know if the sites you use frequently are vulnerable to these hacks? Here’s an easy way to find out. HTTPS encryption is a great way to make your online activity more private, but only if it actually works. Even if you have an …

Amazon Will Add Disk Encryption to Fire OS Tablets Again

Amazon has decided that mobile device data should be kept private after all. This week, the company announced that it has changed course and will re-implement full device disk encryption for Fire OS tablets. As we noted a few days ago, Amazon recently removed full disk encryption features from its Fire OS operating system, which is used on Kindle tablets. …