What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator.
Mainly run for profit...
FaceTime flaw lets people hear you, before you even answer
Think twice before cursing that ex who won’t stop calling: A newly found bug in Apple’s FaceTime means someone...
Here’s why Australia’s cybersecurity bill is a terrible idea
Despite international protest, Australia has passed a new bill that essentially outlaws encryption technology, making its population of 25...
Cloudy skies ahead: LA is suing the Weather Channel for selling...
The city of LA is suing the Weather Company, a subsidiary of IBM, for secretly mining and selling user...
The 9 best ExpressVPN blogs of 2018
2018 was a bumper year for ExpressVPN! Here's the best of 2018 from the best VPN blog in town:
1....
5 famous whistleblowers who risked everything
“See something, say something” is a safety and awareness campaign running across multiple cities in the United States.
If you...
What are the most dangerous technologies of the surveillance age?
Technology such as encryption, VPNs, and Tor can help us maintain and defend our privacy online.
But technology can also...
What will happen to internet privacy in the future?
Unfortunately, we have reached a point where the internet doesn’t work correctly unless we sacrifice some of our privacy....
How plausible deniability can protect your data
Plausible deniability allows individuals to claim they had no involvement in an action taken by others (or, in some...
An introduction to threat modeling
If you are always worried about your ISP, corporations, and the government spying on you, maybe it’s time to...