If you are looking to improve the security of your Linux system, check out Firejail that can sandbox all processes and reduce the risk of security breaches.
Many are unaware that hackers can now crack into wireless mice and keyboard adapters and use them for their own purposes. This article will explain what this attack does and how to protect against it
Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.
For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.
The words “privacy” and “security” are often used interchangeably. Understanding the difference can help you make more educated decisions on how you choose to share your information and what software you choose to use.
Meet Parrot Security OS: a Linux distribution with loads of tools to accomplish your security research along with some useful cloud components. Read all about it!
Android Marshmallow requires most phones to be encrypted, but no one seems to care about pre-Marshmallow devices. These file encryption tools help secure older devices.
Want to make encrypted files harder to access? Want to secure files in the cloud? Meet GuardKey. It can lock and unlock encrypted drives & cloud storage.
No one is exempt from being hacked, getting an identity stolen or any other privacy issue. Therefore, we’ve listed 6 important privacy habits everyone should follow.
Keylogger is software that monitors, records & sends your personal data to a third party without your knowledge. Scary? Yes! Here’s how to protect yourself.
In the past there have been security issues with Android. With Android N they’re trying to combat these issues from the start. Just how secure will it be? Let’s find out.
Looking for a more secure browser for Linux? Check out Xombrero web browser, a minimalist browser with sophisticated built-in security features. It has a familiar interface similar to Firefox.
As a Gmail user, you get the benefit of regularly newly-added features. Here are two new Gmail security features that have been added to its growing list of useful features.
Annoyed by UAC prompts when installing software or making changes in Windows? You’ll just have to deal with it. Here’s why you should not disable user access control in Windows!
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.