The Best Free and Low-Cost VPN Services
Want to browse privately using a VPN without signing up for an expensive plan? Here’s a list of the best low-cost and free VPN providers.
The Best Free and Low-Cost VPN Services Read More »
Want to browse privately using a VPN without signing up for an expensive plan? Here’s a list of the best low-cost and free VPN providers.
The Best Free and Low-Cost VPN Services Read More »
Apple’s recent revelation about a U.S. government order to create a “backdoor” for undermining iPhone encryption will leave lots of people wondering which encryption methods are reliable. Here’s a quick run-down of which encryption algorithms to trust, and which ones are flawed. First, you should understand that there are three basic ways that encryption can
Encryption 101: Which Encryption Type is Most Secure? Read More »
You knew that websites can track you. But did you know your smart TV is probably doing the same thing? Most modern TVs are designed to monitor what you watch and report that information to companies. Fortunately, you can protect your privacy while watching TV. Here’s how to disable monitoring software on smart TVs. The
Smart TV Privacy: How to Disable TV Data Collection Read More »
The newest threat to data privacy on mobile devices enables attackers to break the encryption keys of data stored on Android phones and tablets and iPhones. That’s according to recently published academic research. As the Register reports, the attack involves using a probe to collect a phone or tablet’s electromagnetic emissions while it is encrypting
New Encryption Attack Can Steal Android and iOS Data Read More »
Recently, a string of attacks against SSL encryption have undercut HTTPS privacy on the Internet. Want to know if the sites you use frequently are vulnerable to these hacks? Here’s an easy way to find out. HTTPS encryption is a great way to make your online activity more private, but only if it actually works.
How to Check Websites for HTTPS and SSL Privacy Problems Read More »
Amazon has decided that mobile device data should be kept private after all. This week, the company announced that it has changed course and will re-implement full device disk encryption for Fire OS tablets. As we noted a few days ago, Amazon recently removed full disk encryption features from its Fire OS operating system, which
Amazon Will Add Disk Encryption to Fire OS Tablets Again Read More »
The latest threat to Tor, the online anonymity tool, is simple but serious: Mouse movements may be used to identify users online. Tor is designed to hide your identity on the Internet by making it impossible for websites, or people eavesdropping on network traffic, to determine your true IP address. It does a pretty good
Mouse Movements Could Identify Tor Users’ Real IP Address Read More »
A poorly secured home wireless network is one of the easiest ways for an attacker to steal private data. Here are tips for understanding how to keep your wifi secure and private, including which wifi encryption methods are best. If you think that simply enabling security features on your wireless router means people can’t steal
How to Secure Wireless Routers for Data Privacy Read More »