Enterprise customers are not said to be affected, but millions of consumers and bring-your-own-device users are likely using compromised machines according to an article by Zack Whittaker in ZDNet at http://goo.gl/0UoRJ4. Lenovo-branded devices sold between September 2014 and January 2015 through consumer online and retail stores, like Best Buy and Amazon.com, are likely affected by the Superfish adware, which hijacks secure internet traffic. The news bothers me because the only […]
Encrypter provides fast and convenient encryption-based protection for your private files, ensuring your private data security. AES-256 Encryption Technology Encrypter provides reliable security protection for your business information, videos, e-books, private photos and important files. Typically, you only have to enter the login password to access these data conveniently. Without the password, no other people can access the data or transmit or duplicate the same to other storage devices.
A new network has quietly been built in recent months that adds better security than even Tor. It gained some publicity this weekend when a replacement for the infamous Silk Road web site was announced. “Silk Road Reloaded” launched on Sunday, and is only accessible by downloading the special I2P software, or by configuring your computer in a certain way to connect to I2P web pages, called ‘eepsites’, and which […]
Many Android applications collect a huge amount of user data for various purposes, without always specifically explaining why. Vocativ checked 25 of the most popular Android apps in the Google Play store, counting the number of permissions they require and looking at the kind of data they can collect once the users agrees to them, often without even reading them. In fact, Vocativ claims that some Android apps may be […]
Possibly the most secure of all available operating systems available today is Tails, an abbreviation for The Amnesiac Incognito Live System. If you are concerned about privacy of your email messages and also the ability to visit web sites without being tracked, you should become familiar with Tails. Luckily, that is easy to do. It boots on almost any Windows computer from a USB drive, DVD drive, or a SecureDigital […]
Privacy Protector 1.8 for Macintosh Securely Gets Rid of Files and Data that may Invade Your Privacy
Privacy Protector is a powerful and effective way to securely get rid of files and data that may invade your privacy and act as potential threats to your Mac. You can use this app to remove a host of sensitive information that can be used to track your activities. Specifically, it clears your cache files, cookies, browsing history, and more, all at the click of a button. Privacy Protector uses […]
This one works. I replaced an old MacBook Air about a year ago and purchased a new version of the same thing only with a bigger hard drive, a faster processor, and a better display. The old laptop sat on the shelf for a while until I started pricing out a new security camera to keep en eye on the house when I am away. Wait a minute, I already had […]
Amnesty International has released a program that can spot spying software used by governments to monitor activists and political opponents. Amnesty said many governments used sophisticated spying tools that could grab images from webcams or listen via microphones to monitor people. It wants to see more regulation of the spying software used by governments.
An interesting article in Wired describes how the NSA, researchers in Israel, and possibly others steal data from computers not connected to the Internet. The method allows hackers and spies to surreptitiously siphon passwords and other data from an infected computer by using radio signals generated and transmitted by the computer and received by a mobile phone. You can read the article about “AirHopper” at http://www.wired.com/2014/11/airhopper-hack.