-
Internet hacks: Phishing and spearphishing explained
Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to use these credentials to gain...
-
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...
-
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...
-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
How much can metadata reveal? Just ask John McAfee
Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
Guide to stronger passwords – Part 3 (Diceware)
This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...
-
Guide to stronger passwords, Part 2 (password managers)
This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...
-
How to keep your messages private and anonymous
Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...
-
Tails 2.0 installation and review
This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...