This is how you encrypt your entire life

encryption

Man in the middle attacks. Social engineering. Large scale data breaches. Government surveillance. Device theft. Those are just some of the threats standing in your way as you try to carry on a safe digital life.

APTs. Three letter agencies. Script kiddies. State-sponsored hackers. Cybercrime rings. Data-hungry corporations. Jealous coworkers. Disgruntled employees.

And those are just some of the sources that those threats might come from.

The point is, as more of our lives become digitized and stored on computers and online servers, our data becomes more valuable and makes us more vulnerable to cyberattacks. Continue reading

Advertisements

How to protect yourself against WhatsApp’s non-present backdoor

Secure messaging app

In a controversial Friday 13th scoop, The Guardian unveiled a backdoor in WhatsApp, the popular messaging app owned by Facebook that has over 1 billion users and touts having unbreakable security.

Within a few hours of the Guardian report, the claim was debunked by other outlets, including this detailed piece in Gizmodo. While it is now clear that the backdoor is actually not a backdoor but a natural functionality of the messaging app, here’s what you need to know and what you can do to protect yourself from potential security mishaps. Continue reading

How to secure your smarthome gadgets

smarthome nest thermostat

The holiday season is a big time for consumer electronics and smarthome gadget sales. With so many advances and innovations that we saw in the Internet of Things in 2016, there’s a likely chance that one of those connected devices has found its way into your home, or that of one of your loved ones, this Christmas.

But while IoT devices make our homes more efficient, drive energy saving and reduce costs, you should also take note that IoT devices are a source of security headaches. A huge number of smarthome gadgets are developed without sound development practices and end up being used for evil purposes. Continue reading

How PGP can protect you against email surveillance

5383764072_ab6784e586_o

News broke last week that Yahoo has allowed intelligence agencies to scan user emails. This comes at a very bad time for Yahoo, right on the heels of its 500 million user account data breach—made public earlier this month—and while the company is trying to be acquired Verizon for the meager price of $4.8 billion.

Other tech giants immediately denied having had similar cooperation with government agencies in the wake of the Yahoo leak, though they all have a track record of wholesaling their data to government agencies under the NSA’s PRISM program. Continue reading

How to prevent Google from owning you

Online privacy

I love Google—can’t get enough of it in fact. It allows me to search the entire internet at the speed of lightning, takes care of my emails, calendar, documents and whatnot. And it has also provided me with the main web browser I use on non-Mac computers.

And it’s giving me all this for free. Or is it?

In fact, it’s not. Google is a for-profit business and is not in the habit of making generous pro bono giveaways. In exchange for the services it offers, the firm collects tons of data from each of its users, and we all know that data is the currency of the future. Continue reading

Protecting company data and brand by avoiding network hacks

Data center

Guest post by Simon Parker, courtesy of Minerva Security

Both small and large corporations are tasked with securing their networks and computer systems, particularly from intruders who want to hack into them to gain access to sensitive and confidential information. For this reason, putting the appropriate safety measures in place is critical to these organizations, specifically in an environment where any company is subject to these fraudulent acts. In fact, based on information that was provided by researchers in the United Kingdom, approximately 50% of their business’ systems are currently at risk because they do not have the efficient computer security procedures established. Continue reading