The Zoom videoconferencing program at https://zoom.us/ has proven very popular during the CoronaVirus pandemic with all the various isolation policies in place. while popular, the Zoom app has also been criticized for not being fully encrypted, not totally private, and for lacking several other features. Now Zoom has released an enhanced and encrypted version of the application in order to ensure protection and privacy of personal information, and is asking […]
NetMarketShare is a company that keeps track of what operating systems people on the internet are using. The company reported the use of Microsoft Windows 10 dropped slightly in April, 2020 from 57.34% in March to 56.08% in April. Obviously, Microsoft still dominates the operating system marketplace but any drop, even a drop of only 1.26%, still represents many thousands of operating system changes. Windows 7’s market share dropped as […]
Tails is one of the most secure, possibly THE most secure, operating system available for PC computers today. The Tails Operating System is even recommended by Edward Snowden. Now Tails is capable of booting on systems where UEFI Secure Boot is enabled. Launched in 2009, the Tails OS is meant to be launched from DVDs or USB thumb drives, operates solely in a computer’s RAM, runs all network traffic through […]
I have written before about the FREE ProtonVPN. See https://duckduckgo.com/?q=site%3Aprivacyblog.com+ProtonVPN for a list of my past articles. I consider it to be a great FREE VPN, one of the very few free VPNs I would trust. HOWEVER, a hacker has now created a look-alike product that actually is malware (malevolent software) that, once installed in a computer, steals every user name and password for every site the computer visits. Even […]
According to many articles on the Web, including one written by Danny Palmer and published in the ZDNet web site: “Windows 7 has reached end of life and now isn’t supported by Microsoft. It means businesses and consumers with PCs running on Windows 7 – which was introduced in 2009 – will no longer receive technical assistance, software patches and security updates from Microsoft, unless they want to pay extra.” […]
From the Associated Press: MOSCOW (AP) – Russia has banned the use on its territory of a smartphone app widely used like a walkie-talkie to organize demonstrations and other gatherings. The app, called Zello, reportedly has been popular among long-distance truckers in Russia who are conducting strikes to protest a road tariff system.
If you use Windows, you need to read the article by Steve Ranger in the ZDNet web site at: https://tinyurl.com/utqrle3. He writes: “Tech security company Bitdefender analysed Windows security threats including ransomware, coin miners, fileless malware, PUAs (‘potentially unwanted applications’ that can compromise privacy or security), exploits (attacks based on unpatched or previously-unknown vulnerabilities) and banking Trojans. “Bitdefender found that of all these threats, ransomware reports saw the biggest year-on-year […]
FreeNet is among the best Tor alternatives and is combined with both OpenNet and Darknet technologies. The P2P security software is credible for unblocking censorship. This Tor alternative does not have a central server; therefore, it is difficult to hack their systems even those who are responsible for the system maintenance are not accessible to the user’s details. FreeNet gathers the data in peers, and all the uploaded content is […]
The latest Patch Tuesday update from Microsoft included several critical security fixes. Unfortunately, as Microsoft has now confirmed, it also borked some things. If you haven’t applied that August 13 update and are running on Windows 10, Windows 8.1 or Windows 7, you may want to read an article by Davey Winder in the Forbes web site before you do. Click here to read the article.
If you want to keep a few secret documents or even applications, you need to encrypt them and hide them in your computer. If you have more than one computer (desktop, laptop, tablet, smartphone, etc.), you probably should have these secret, encrypted files automatically available on each computer and do that in such a manner that everything remains securely encrypted when copied to the other system(s). Even if you only […]