Security And Privacy Articles

Does Copyright Scanning Lead To Censorship?

Does Copyright Scanning Lead To Censorship?

July 15, 2016

If you are like most everyone else who tends to get a good majority of the information you receive from sources on the Web, you may not have even considered the idea of censorship with respect to what you see ... Full Story

Not On My Watch Says Tim Cook

Not On My Watch Says Tim Cook

October 3, 2014

Of course you know the name Tim Cook. Cook is the CEO of Apple Inc and simply put, has a bit of influence when he speaks. In a recent interview with journalist Charlie Rose, Mr. Cook spoke about privacy and ... Full Story

Finally, An App For the Rest Of Us

Finally, An App For the Rest Of Us

September 19, 2014

The rest of the world that is still hard at work on their desktop computers running Microsoft Windows, that is. Yes, it is true the media keeps pointing out again and again how seemingly everyone is moving to Smartphones and ... Full Story

“Anti-social” Network Nextdoor Connecting Neighborhoods, Solving Crimes

“Anti-social” Network Nextdoor Connecting Neighborhoods, Solving Crimes

August 27, 2014

First launched in 2010 at the height of the social network rush following the success of Facebook, Nextdoor is one of the few social networks that has not only survived, but actually thrived during that time, primarily because it is ... Full Story

Traffic Lights at Risk of Being Hacked Researchers Prove

Traffic Lights at Risk of Being Hacked Researchers Prove

August 21, 2014

Many are the action movies in which we see either the bad guys or even the good guys (in the case of The Italian Job) hack the traffic lights to give themselves an advantage in their getaway, or to cause ... Full Story

This Wireless Security Camera Wants to be a Fly on Your Wall (or Ceiling)

This Wireless Security Camera Wants to be a Fly on Your Wall (or Ceiling)

July 24, 2014

Homes across the world are about to get a whole lot more monitored. A wireless HD security camera complete with environmental sensing capabilities is well on its way to meeting its Kickstarter funding goal of $200,000, and will provide ... Full Story

“Big Dog” Has First Live Military Training Exercise

“Big Dog” Has First Live Military Training Exercise

July 18, 2014

The “Big Dog” robotic pack mule, now also affectionately known as “Cujo” after the rabid dog from Stephen King’s novel of the same name (and not former hockey goaltender Curtis Joseph), finally got its first live field test after ... Full Story

DNA-Erasing Spray “Invisible” Available Later This Month

DNA-Erasing Spray “Invisible” Available Later This Month

June 10, 2014

BioGen Futures is on the verge of releasing Invisible, their combination of two sprays which they say will wipe out any forensic evidence of your presence. The sprays are being touted as a breakthrough in privacy, while raising some fears ... Full Story

SafeMonk a Powerful Dropbox Encryption Tool

SafeMonk a Powerful Dropbox Encryption Tool

June 8, 2014

We recently reported on the demise of TrueCrypt, the free, open-source encryption software tool, which shut down under mysterious circumstances some days ago. The void created by TrueCrypt’s disappearing act has left many people wondering where they can turn ... Full Story

TrueCrypt Mysteriously Shut Down with Ominous Warning

TrueCrypt Mysteriously Shut Down with Ominous Warning

June 5, 2014

The open-source cryptography software TrueCrypt, in use for a decade and endorsed by Edward Snowden as the best freeware encryption software available, has seemingly shut down in a very cryptic way (befitting perhaps?).

There was no official announcement from the ... Full Story

Mega’s Secure Email Service Nearing Launch

Mega’s Secure Email Service Nearing Launch

May 29, 2014

A year and a half after its relaunch from the ashes of Megaupload and Medavideo as simply Mega, the company which now dubs itself “The Privacy Company” is preparing to launch its new email service which will be the first ... Full Story

GE Purchases Wurldtech to Beef Up Internet-Connected Device Security

GE Purchases Wurldtech to Beef Up Internet-Connected Device Security

May 21, 2014

GE plans to be a leader in bringing the next phase of internet and connectivity to the masses: the Internet of Things (IoT)as it’s being called; when everything from your toaster, to your car, to your toothbrush, to ... Full Story

Highly Secure Blackphone by Silent Circle Protects Users from NSA Spying

Highly Secure Blackphone by Silent Circle Protects Users from NSA Spying

May 16, 2014

Pre-orders for the Blackphone, a secure handset jointly developed by Silent Circle and Geeksphone, have sold-out, as the device looks set to offer the first highly secure mobile phone at a realistic consumer price point ($629).

First unveiled at the ... Full Story

NSA May Have Compromised Servers, Routers Shipped Overseas

NSA May Have Compromised Servers, Routers Shipped Overseas

May 12, 2014

In the recently published No Place to Hide, author Glenn Greenwald details the many ways in which the U.S National Security Agency (NSA) spies not only on its own citizens under the guise of protecting national interests, but also ... Full Story

Heartbleed Vulnerability Still High, Reach Spreading

Heartbleed Vulnerability Still High, Reach Spreading

April 24, 2014

The Heartbleed Bug is a severe vulnerability in the OpenSSL library that was first exposed by Google and Codenomicon in April 2014. Affected versions of the open-source library used to encrypt traffic and data across networks had a severe vulnerability ... Full Story