its

Proxy.sh Anonymous VPN: A Review

Proxy.sh is one of the most feature-rich VPN services. It’s also extremely BitTorrent-friendly and makes an emphatic promise not to log user data. It supports all the major operating systems for desktop and mobile. Pricing is competitive but a little confusing, so you should pay close attention to which features come with which plans. These …

Proxy.sh Anonymous VPN: A Review Read More »

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

New Encryption Attack Can Steal Android and iOS Data

The newest threat to data privacy on mobile devices enables attackers to break the encryption keys of data stored on Android phones and tablets and iPhones. That’s according to recently published academic research. As the Register reports, the attack involves using a probe to collect a phone or tablet’s electromagnetic emissions while it is encrypting …

New Encryption Attack Can Steal Android and iOS Data Read More »

Amazon Will Add Disk Encryption to Fire OS Tablets Again

Amazon has decided that mobile device data should be kept private after all. This week, the company announced that it has changed course and will re-implement full device disk encryption for Fire OS tablets. As we noted a few days ago, Amazon recently removed full disk encryption features from its Fire OS operating system, which …

Amazon Will Add Disk Encryption to Fire OS Tablets Again Read More »

How To: Set Up a Tails Virtual Machine for Private Browsing

If you want the privacy advantages of using a secure Linux-based OS like Tails but don’t want to use Linux all the time, an easy (and free) solution is to run Tails inside a virtual machine. Here’s how. These instructions should work for pretty much any Linux-based OS. But we have written them for Tails, …

How To: Set Up a Tails Virtual Machine for Private Browsing Read More »

Scroll to Top