Nowadays, when privacy threats multiply by the minute, it is not a question anymore whether we can get away with using outdated versions of Internet and PC privacy software. New threats pose new challenges and to keep our computer’s defense system powerful enough to fight them is something we can do a lot about. In this article we’d like to highlight the top 5 reasons why it is crucial to keep your east-tec Eraser subscription active and the product up-to-date. We are going to list both privacy and efficiency issues to give you a full picture.Read More
If you are one of the hundreds of millions who regularly use Dropbox, there is something you should know: While the service provides a very handy and hassle free way for file storage, syncing and sharing, its cache folder, hidden on your hard drive, can easily turn into a goldmine for hackers. Dropbox cache was designed to offer users a quick and effortless way to restore deleted files, so it retains a copy of every single file you delete, on your HDD.Read More
There are numerous data wipe standards for the secure removal of sensitive information from PC hard drives and removable data storage devices. east-tec Eraser offers you 14 of them. In this article we would like to recommend you wipe methods for different privacy scenarios and tell you what speed/security balance you can expect when running them. We have also included screenshots to show you how much it is a child`s play to switch between standards with the software’s built-in slider selector.Read More
The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.
Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?Read More
The recent and unfortunate case of Amazon S3 data exposure drew our attention, once again, to some of the potential risks of data handling even cloud storage can not prevent. An analysis conducted by Rapid7 revealed that a misconfiguration issue left nearly 2000 S3 buckets exposed. Including potentially sensitive data.
We can see from that example that accidents can happen even when companies like Amazon look after your data. This is not to say you should quit using cloud services. They usually do provide a great and highly secure way for data storage and handling. But there are some extra measures you could, and should take to protect your data stored in the cloud.Read More