latest
Should You Use a Free VPN Chrome Extension?
Here are the pros and cons of installing a free VPN add-on to your Google Chrome browser.
What Is SSL Stripping and How Can You Defend Against It?
By downgrading a secure HTTPS connection to HTTP, a hacker could intercept all your data and alter what you see online. Here's how.
Deep vs. Dark Web: What's the Difference and Which Is Most Dangerous?
The internet is made up of many layers, including the deep web and the more notorious dark web. But what are the risks of each?
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?
Cryptographic oracles can be great tools for hackers. Here's why.
5 Ways to Encrypt Your Internet Traffic
How can you keep all your data secure? Encryption is the key. Here's how to take a comprehensive approach to securing your information.
Still Using SMS? You Should Stop: Here's Why
A lot of users still default to SMS on their smartphones. But that's bad news for your security and privacy. Here's why and what you can do.
Should You Use a VPN on the Dark Web?
There's a difference between the surface, deep, and dark webs, with the latter generally considered a breeding ground for illicit activities...
How to Make a Raspberry Pi WPA Encrypted Wireless Hotspot Device
Need a secure Wi-Fi hotspot to share an Ethernet connection? Here's how to use a Raspberry Pi to create one.
Is Google Password Manager Safe and Secure?
Google might ask you if you want it to store your login credentials, but can you trust Google's own Password Manager? Is it safe to use?
8 Reasons Why Free VPNs Just Don't Cut It
VPNs are rightly popular, but that level of privacy doesn't come cheap. Sadly, free VPN services come with risks that may not be worth taking...
The Top 7 Anonymity Networks for Improving Online Privacy
Various technologies can help keep your data private online. Here are some of the best ways to stay anonymous.
What Is a MixNet and How Does It Work?
Looking for privacy and anonymity online? Don't immediately turn to VPNs or Tor: MixNets could be the answer.
How to Send PGP-Encrypted Email on Linux With Evolution
Want to secure your conversations from prying eyes? Here's how you can send PGP-encrypted emails from your Linux PC with Evolution.
4 Ways to Test a VPN's Encryption
How can you check that your VPN is working? Is it encrypting your data? Here are a few ways you can tell if your information is kept secure.
The Top 7 Ways to Secure Your Personal Communications
Your personal communications should always be kept safe. Here's how you can protect them from prying eyes.
Do VPNs Store Your Personal Information?
Yes, VPNs are supposed to keep you anonymous, but some still collect data. So how can you avoid this? And what data shouldn't a VPN collect?
How to Easily Encrypt and Decrypt Files With Seahorse on Ubuntu
Learn more about security and encryption using Seahorse in Linux.
The 7 Best Online Password Generators for Strong Random Passwords
Looking for a way to quickly create an unbreakable password? Try one of these online password generators.
Develop Secure E-Commerce Websites With These 8 Top Tips
Customers will only use a website if they trust it. Here's how to secure that trust... while securing your shopping site!
What Is Bring Your Own Key, and Why Is It Important?
Worried about how data is kept in the cloud? Encryption is vital, but still has its issues. That's where BYOK comes in.