Even though government surveillance is nothing new – just think of Caesar’s spies in the Roman Empire, or the KGB in the former Soviet Union – the Snowden revelations made us realize how much it was a part of our modern lives, too. The fact that agency staff could witness private moments of our lives whenever they liked, even if were up to nothing wrong, was a sobering realization to say the least. Being a good citizen, it seems, doesn’t qualify one anymore for being excluded from monitoring so in this post we are looking at techniques that can help you protect your Internet privacy in the face of mass surveillance.Read More
When you think of threats that may compromise your encrypted personal, or business files, the last thing that comes to mind is the popular document editors you regularly handle your docs with. However, the working mechanisms of these applications may pose just as much privacy threats to your files as evil-minded cyber-crooks operating from Russia, or China do.
Case in point, the auto-recovery feature in MS Office and OpenOffice. By default, the apps save copies of docs you are working on to your computer’s hard drive in every 10-15 minutes so that your unsaved edits can be rescued if there is a system crash, power failure, or an application crash.Read More
If your dad owns a PC and you haven’t decided yet what to get him for Father’s Day, we might be able to help you with a gift idea. Safeguarding the privacy of his browsing data, online finances, social networking, emails, Skype, documents, images and many more, become much easier and secure using east-tec Eraser. The software will securely wipe his confidential Internet tracks, applications history and Windows tracks beyond recovery. Let’s take a virtual tour that shows some of the most important ways this powerful privacy suite can protect his data and identity.Read More
In case you have been using the popular encryption product, please pay close attention to the information we share in this article, since your data privacy is likely to be in danger. TrueCrypt’s recent, mysterious end-of-life announcement has shocked the crypto-world and a huge number of worldwide users. The announcement officially states that “Using TrueCrypt is not secure as it may contain unfixed security issues” and that “the development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.”Read More
Welcome to the latest post in our Expert Interviews section.
Solid technical expertise, brilliant writing style and outstanding dedication: Meet Al Fasoldt, the tech-writer behind the world’s longest newspaper and online coverage of computers, software and consumer technology.Read More