What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can,...
Could Facebook’s messenger merger signal dark days for WhatsApp users?
NOTE: This post was originally published on January 31, 2019 Facebook founder Mark Zuckerberg recently announced plans to merge his three dominant messaging services: Instagram,...
Facebook’s 10-Year Challenge went from nostalgic to dystopian real quick
NOTE: This post was originally published on January 25, 2019 A seemingly innocuous photo op with a potentially seedy underside, the 10-Year Challenge is the...
Facebook vs. ad blockers: No matter who wins, you lose
NOTE: This post was originally published on December 15, 2018 In the latest chapter of Facebook’s war against ad blockers, developers have reported that the...
An introduction to threat modeling
If you are always worried about your ISP, corporations, and the government spying on you, maybe it’s time to complete an exercise called threat...
How to properly dispose of your hard drives
Data is valuable. Your pictures, legal documents, chat logs, and even saved video games are all things you wouldn't want to be public. Today, people...
ExpressVPN launches “Signals of Trustworthy VPNs” with CDT
NOTE: This post was originally published on October 16, 2018 Crunchy? Extra creamy? Reduced fat? Old-fashioned, whatever that means? We’ve all had that feeling of being...
The art of social engineering: Are you being conditioned?
As we get better at securing our computer systems, we are discovering that the weakest line of defense is, in fact, the human being....
Why HTTPS vs. VPN makes no sense
HTTPS vs. VPN makes very little sense. Both are important means of internet protection, and there is absolutely no conflict between them.
Wi-Fi security: How to stay safe while connected
Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators and users. Operators of Wi-Fi...