-
How to back up your files and encrypt them
We accumulate tons of data in the form of pictures, emails, chats, documents, recordings, and videos. Keeping them safe and accessible in the long run is easy but takes forethought. To protect yoursel...
-
How to improve your email security
No matter if it’s private communication or business, your emails contain practically everything there is to know about you. From your emails, anyone can learn about your work, relationships, vacatio...
-
How (and why) to keep multiple online identities separate
For some, online anonymity is just fun. We can redefine who we are, pretend to be a dolphin, or vent into the void without having to worry what our conservative parents or restrictive boss would think...
-
Modern-day encryption has ancient cryptography beginnings
How to communicate privately has fascinated mathematicians for millennia, possibly as far back as ancient Egypt. Greek strategists would often make use of simple cryptographic tools. Julius Caesar rep...
-
Here's how bug bounties improve security
Software could be the most complex tool created by humans. While it might still be possible for a single individual to understand all the functioning parts of a car or telephone, it’s unlikely any o...
-
What is malware? How viruses, trojans, and ransomware work
Malware, or "malicious software," is a term for a variety of viruses, spyware, or ransomware (cryptolockers) that cause harm to a user, their data, or devices. The term malware implies malicious inten...
-
How do advertisers always know where you are?
To build a profile of you, advertisers can gather a multitude of information. They can follow you around the web using a tracking code, browser fingerprinting, store cookies on your machine, or even b...
-
What is cybertorture? How our minds are vulnerable to online experiences
What will change if we are forced to move our social circle to virtual lands, browse the web anonymously, and stay permanently at home? Will there still be any crime? Will nations still exist, and wil...
-
8 anti-spam techniques your email uses to prevent spam
It’s difficult to define exactly what constitutes email spam. What might be a useful newsletter to one person could be unwanted advertising to another, and a welcome business opportunity will be ill...
-
Global Internet and Social Media Censorship Report, 2020
NOTE: This post was originally published on January 24, 2020 Around the world, internet censorship remains a popular tool of authoritarian governments to prevent information from spreading, to stop pe...