By Maxwell Donovan, BestOnlineReviews.com
Passwords are essential. They are the only way that gives you a direct ticket to various sites any time you want to. However, only understanding and observing the basics of password protection is not enough for you to keep hackers away for good? Over just the basics protections such as two-factor authentication, password manager and of course ensuring that your password is secure from being easily guessed by hackers. These are valuable tips for protecting your online security. However, you still need to go an extra mile beyond the standard. Here are a few tips from experts to ensure your online security is not compromised. Continue reading
Last year, when the FBI ordered Apple to help it break into an iPhone that belonged to a terrorist, the company denied to comply and challenged the federal government in court to avoid setting a precedent that would undermine the privacy of all its users.
18 months later, when the Chinese government ordered Apple to remove major Virtual Private Network (VPN) apps from its version of the App Store that is available in the country, it caved in without a fight.
This is not a move you’d expect from a company that professes to be dedicated to protecting customer privacy and information. VPN apps are extremely important to evade surveillance and circumvent censorship, especially in countries like China where the internet traffic strictly controlled and limited. Continue reading
I think it’s totally up to me whether I decide to open an email or not. But apparently, others are not of the same opinion. That’s why they use mail tracking applications, a breed of software that will let the sender of an email know when you read their message.
I find it invasive, even more offending than link trackers (most mail trackers track links as well). And as it happens, most—but not all—of the tracked emails I receive are of little value. That’s why I block mail trackers and let their users think their emails were never opened.
So if you find email tracking creepy, here’s what you need to know about how it works and how you can stop it. Continue reading
As internet privacy continues to unravel, it is becoming more and more evident that you’re on your own to protect your data against the many parties that are looking to hoard it. Perhaps one of the most pervasive collectors of data are Internet Service Providers (ISPs), the same companies that connect you to the internet.
ISPs have a huge stake in collecting data, mostly in selling it to advertisers to serve more targeted ads. And they’re in the best position to do so with wild abandon, without fear of retribution.
But a lot more than your preferences can be inferred from your internet traffic, including your health conditions and political orientation among others. Continue reading
One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from seemingly trustworthy sources.
You think it’s unnecessary caution? Ask John Podesta, chairman of Hillary Clinton’s presidential elections campaign. This is exactly how he (or the operator of his email account) gave away his accounts credentials to hackers. The breach led to a series of damaging and embarrassing leaks which might have cost his boss her chance of becoming president. Continue reading
The main takeaway from the buildup of developments in the cybersecurity landscape is that privacy is becoming a commodity. The CIA is spying on your phone. Hackers are breaking into your home. Your documents, emails, messages, can be intercepted. And Congress is empowering ISPs to pry into your communications.
Long story short, nothing remains secret.
Under such circumstances, encryption becomes your best friend, your last line of defense in protecting your information. Continue reading
Last week, WikiLeaks dropped a bombshell on intelligence agencies by publishing a trove of classified documents dubbed “Vault 7.” The revelations gave a damning account of government surveillance powers and hacking capabilities.
It was also a testament to how vulnerable the increasing number of Internet-connected devices we own can make us. And if you think you shouldn’t worry about what hacking capabilities the feds have, think again. Three-letter-agencies aren’t the only ones who are looking for security holes in hardware and software.
As with every hack that makes noise, the Vault 7 leak is associated with new facts, old misunderstandings and some very important lessons. Here’s what you need to know about the latest batch of information that WikiLeaks has spilled into cyberspace. Continue reading