Data Shredder for Mac 2017 Offers Military Grade Data Deletion

Miami-based security solutions company, ProtectStar today announced Data Shredder for Mac 2017, their new military grade data deletion tool for macOS computers. The app securely and efficiently deletes data using methods that meet and exceed government, military, and industry standards. Users simply drag-and-drop files, folders, or drives to the app and press the “Shred” button. Data Shredder then completely eliminates any chance for data reconstruction, even by government agencies.

Data Shredder for Mac 2017 sells for $19.90.

The new Data Shredder for Mac 2017 joins several other, related products that have been available from ProtectStar for some time, including:

Continue reading

Online Security 101: Tips for Protecting Your Privacy from Hackers and Spies

Zack Whittaker has published an article that perhaps should be required reading for everyone before the purchase of their first computers. Whittaker writes:

“Privacy is what sets us apart from the animals. It’s also what sets many countries and citizens apart from dictatorships and despots. People often don’t think about their rights until they need them — whether it’s when they’re arrested at a protest or pulled over for a routine traffic stop.

“Surveillance is also a part of life, and it’s getting progressively more invasive. Government eavesdropping is increasing, carried out in wider secrecy, and it’s becoming far more localized.”

There is a lot more at: http://zd.net/2r78Q1Q.

5 Ways Your Security Is at Risk in the Office

Dan Price has written an article that I will suggest should be required reading for anyone who uses an employer’s computer(s). 5 Ways Your Security Is at Risk in the Office at http://www.makeuseof.com/tag/ways-security-at-risk-office outlines some risks you should be thinking about.

I especially agree with a recommendation near the end of the article: “don’t keep any personal data on your employer’s network.”

Again, the article is available at: http://www.makeuseof.com/tag/ways-security-at-risk-office.

Facial Recognition Database used by the FBI is Out of Control

Yes, Big Brother is closely watching you, me, and everyone else, as if we didn’t know that already.

The House oversight committee claims the FBI’s facial recognition database is out of control, noting that “no federal law controls this technology” and “no court decision limits it.” At last week’s House oversight committee hearing, politicians and privacy campaigners presented several “damning facts” about the databases. “About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports,” reports The Guardian. “The algorithms used to identify matches are inaccurate about 15% of the time, and are most likely to misidentify black people than white people.”

Details are available on The Guardian at: http://bit.ly/2mN5iDi.

Macintosh Users: Encrypt and Hide Your Private Files with Hider 2

If you have something you would like to keep secret, whether it is your income tax return, your bet list you give to your bookie, or your wife’s or girlfriend’s (or both!) sizes needed for Christmas gifts, Hider 2 is the application you need. It keeps your data locked up and protected with password protection. Nobody gets into the app or your data without your password. It also optionally hides your file(s) and folder(s) so that they are invisible to Macintosh Finder, Spotlight, and other Mac applications. Family members who share your computer or online spies who access it remotely will not find or decode files that have been encrypted and hidden with Hider 2.

In short, as mentioned on the application’s web site, “Hider 2 is the Fort Knox of digital storage. Anything and everything you hide with Hider 2 is tightly locked up and hidden, making it ultra-secure.”

Continue reading

Digital Privacy at the U.S Border: A New How-To Guide from EFF

The U.S. government reported a five-fold increase in the number of electronic media searches at the border in a single year, from 4,764 in 2015 to 23,877 in 2016. Every one of those searches was a potential privacy violation.

The Electronic Frontier Foundation has announced a new (free) document for those of us who want to protect the private data on our computers, phones, and other digital devices. Quoting from the EFF website:

“Increasingly frequent and invasive searches at the U.S. border have raised questions for those of us who want to protect the private data on our computers, phones, and other digital devices. A new guide released today by the Electronic Frontier Foundation (EFF) gives travelers the facts they need in order to prepare for border crossings while protecting their digital information.

Continue reading

How to Keep Your Smart TV from Spying on You

We used to think it was only the evil Russians and Chinese who were behind malware and spyware. The recent release by Wikileaks of 8,761 CIA documents detailing the agency’s hacking of smart phones, routers, computers, and even televisions proves that the Russians and the Chinese aren’t the only “bad guys.” Even the people we thought were the “good guys” instead are really evil.

The files reveal that the CIA can and has hacked devices that were supposedly secure– iPhones, iPads, and Android devices. The CIA is even deliberately infecting personal computers with spyware, including Windows, Macintosh OS/X, Solaris, Linux, and other operating systems. Perhaps even worse, the CIA is also infecting your television set and mine, including Samsung smart TVs, through a program called “Weeping Angel”. Even if you think the TV is off, it’s not. Your smart TV may well be listening in to your conversations and even watching you from its built-in video camera.

If caught, the CIA apparently says, “We’ll just blame the Russians.”

Continue reading