Tor is probably the best-known privacy network and also one of the best at protecting your personal data. It is free software for enabling anonymous communication. According to Wikipedia: The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage […]
Huge changes are coming from Microsoft. A new rumor is going around that claims Microsoft is switching from SELLING Windows to RENTING it instead. Some users think it will be an improvement while others believe it will be a major step backwards to computing in the way it was done in the 1970s when very expensive mainframes did all the computing and all data input and output by humans was […]
Do you use the LoJack anti-laptop theft tool? If so, you definitely need to read an article in The Register at: http://bit.ly/2JPqfVe.
In my recent article, US Hospital Pays $55,000 to Hackers after Ransomware Attack, I referred to “all good backup products.” That obviously leads to the question, “Which backup products are good ones?” I do not have a list of all good backup products for all operating systems, especially for those that are designed for use in large data processing centers. I am sure there must be dozens of such products. […]
News stories over the past few years about the unconstitutional actions of the National Security Agency (NSA) and other government agencies should serve as a wake-up call for all of us. Yes, there are many people and organizations trying to obtain information about you. From hackers in third-world countries, to companies trying to sell you products, to semi-secret agencies of the U.S. Government, it seems as if nearly everyone is […]
Today’s world is already comparable to George Orwell’s dystopian novel ‘1984’, since “everyone is being followed and everyone’s information is being collected.” Lack of awareness of the amount of data harvested online is “a perfect storm of a really bad idea,” according to Jon von Tetzchner. He said he was increasingly concerned about data collection and tracking by tech giants like Google and Facebook. He wants to change that. von […]
Government hackers were using a previously-unknown vulnerability in Microsoft’s .NET Framework, a development platform for building apps, to hack targets and infect them with spyware, according to security firm FireEye. The firm revealed the espionage campaign on Tuesday, on the same day Microsoft patched the vulnerability. According to FireEye, the bug, which until today was a zero-day, was being used by a customer of FinFisher, a company that sells surveillance […]