New Report: Privacy Ignored While Apps and Devices Proliferate

Lack of digital privacy between individuals and companies, increased hacking of private data and new security and privacy risks associated with the Internet of Things (IoT) will top the list of cyber threats in 2016, according to a recent report from Georgia Tech. The study, titled “2016 Emerging Cyber Threats Report,” outlines what researchers at […]

New Report: Privacy Ignored While Apps and Devices Proliferate Read More »

Using Eraser to Delete Private Data Completely from Old Disks

Keeping your data private while online is one thing, but how do you protect data on old computers or disks after they’re no longer in use? Eraser, an open source data destruction tool, provides a solution. Contrary to popular belief, “deleting” files from your computer doesn’t make them go away forever. In most cases, file

Using Eraser to Delete Private Data Completely from Old Disks Read More »

China and Iran at Bottom of Report on Government Censorship

How does Internet freedom compare between different countries? A report out this week from Freedom House aims to answer that question by ranking countries according to online censorship policies. The report, titled “Freedom on the Net 2015,” presents information about Internet censorship in 88 countries. It assigns each country a score while also providing reports

China and Iran at Bottom of Report on Government Censorship Read More »

Bleep: A P2P, Secure and Private Alternative to Skype for VoIP

Is Skype private? Not really. Bleep offers a better option for making free and private voice or video calls over the Internet using VoIP. Skype, the leading VoIP app, offers basic privacy features, most notably built-in encryption. But Skype is closed-source software, which means only Skype developers know how it truly works, or what information

Bleep: A P2P, Secure and Private Alternative to Skype for VoIP Read More »

Houthi-Controlled Yemen Extends Internet Censorship

Add Houthi-controlled Yemen to the list of places currently subject to government-sponsored Internet censorship. With the help of a Canadian company, Houthi rebels in Yemen’s civil war are blocking online content. The Houthis are an ethnic group that effectively seized control of Yemen over the last year. They weren’t the first to introduce Internet censorship

Houthi-Controlled Yemen Extends Internet Censorship Read More »

How to Ensure All Your Traffic Goes through a VPN on Linux

Is your VPN protecting all of your online activity? Depending on how the software is configured, it may not be. But if you’re using Linux, it’s easy enough to force the VPN to encrypt all of your traffic. Here’s how. Some VPN servers and clients are configured by default to route only certain traffic through

How to Ensure All Your Traffic Goes through a VPN on Linux Read More »

Ukraine’s Cyberpolice Plan Registry of Censored Websites

Ukraine became the latest country to introduce systematic online censorship this month with the government’s announcement of a “cyberpolice” force. According to the government, the main purpose of Ukraine’s cyberpolice is to combat criminal activity on the Internet, such as identity theft, phishing, money laundering and digital piracy. The force’s creation is part of a

Ukraine’s Cyberpolice Plan Registry of Censored Websites Read More »

Russian Censors’ Effort to Block Tor Suffers Setback

Censored Person

Internet censorship in Russia has grown more difficult for the government. A company hired to identify and monitor people who use Tor to circumvent online censorship has jumped ship. In 2014, the Russian government contracted with the Central Research Institute of Economics, Informatics and Control Systems “to study the possibility of obtaining technical information on

Russian Censors’ Effort to Block Tor Suffers Setback Read More »

Scroll to Top