<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Why online privacy matters – and how to take it back

[fa icon="calendar'] May 15, 2017 10:38:41 AM / by Stefan Topuzov

Privacy is a fundamental human right. Everyone is entitled to their own domain – property, thoughts, identity, secrets, etc. – everything that defines one’s self. The concept of privacy is one of the cornerstones of modern civilization. Then why do people brush off as unimportant most efforts to safeguard privacy in the online world?

Read More ...

[fa icon="comment"] 0 Comments

How not to get hacked: 15 tips to improve your online security

[fa icon="calendar'] Feb 6, 2017 10:52:14 AM / by Stefan Topuzov

Are you worried about your phone getting hacked? You should be. In the cybersecurity arms race between defenders and attackers, the latter usually have the upper hand due to the large attack surface most devices have. What can you do to protect your privacy from hackers? The first step is to start following all the rules listed below.

Read More ...

[fa icon="comment"] 0 Comments

Lock pattern, PIN, or password: What is the most reliable way to lock a phone?

[fa icon="calendar'] Jan 30, 2017 10:56:41 AM / by Stefan Topuzov

It is common wisdom that passwords are a very ineffective method for authentication. They can be brute-forced or guessed in a dictionary attack. So why use a password to lock your phone? Because the lock pattern and the common four-digit PIN are way weaker. So, what is the most reliable way to lock a phone? Here’s a rundown of the methods and why you better stick with passwords.

Read More ...

[fa icon="comment"] 0 Comments

Passwords: How to come up with strong ones? (And why yours suck)

[fa icon="calendar'] Jan 9, 2017 10:25:05 AM / by Stefan Topuzov

As imperfect as they are, passwords are still the most common method for authentication. And will continue to be at least in the near future. This makes it critical that everyone uses strong passwords. Unfortunately, what the average Internet user considers a decent password is usually a pretty weak one. Here are a few things to consider when coming up with passwords.

Read More ...

[fa icon="comment"] 0 Comments

What to look for when choosing an encrypted communications provider?

[fa icon="calendar'] Dec 30, 2016 7:07:45 AM / by Stefan Topuzov

Are you worried about your online privacy? If you haven’t taken any measures to protect it, yes, you should be. Lucky for you, there is a rapidly growing industry of online security solution providers that would be happy to help you with that problem. These companies offer encrypted communication tools and claim they give you maximum security. Here’s how you should be able to tell apart the encrypted communication providers that you can actually trust.

Read More ...

[fa icon="comment"] 0 Comments

Malicious apps spy on you and steal your data. How can you stop them?

[fa icon="calendar'] Dec 13, 2016 6:01:43 AM / by Stefan Topuzov

Your phone knows an awful lot about you. Your location, your bank account, the names of all your contacts, the passwords to all your accounts… You name it. And different apps on it have access, and permissions, to transmit this data to God knows who. You may trust the manufacturer of your phone has put only software on it that respects your privacy. But what about third-party apps that have the same permissions? And what if you have no idea how these apps got on your phone?

Read More ...

[fa icon="comment"] 0 Comments

Is there a tide of mass surveillance rising? Here’s how to prepare

[fa icon="calendar'] Nov 25, 2016 8:43:51 AM / by Stefan Topuzov

Edward Snowden once made the point that the reality of mass surveillance is always one election away. The technology to undertake it is already available and the privacy protection laws are like a duct-tape holding the floodgates – all you need is one 9/11 type of event and the tape will be done away with. But what could you do to preserve privacy when that happens?

Read More ...

[fa icon="comment"] 0 Comments

How to avoid privacy threats when using free Wi-Fi

[fa icon="calendar'] Nov 21, 2016 10:47:39 AM / by Stefan Topuzov

In an age when people do more and more things on their smartphones, getting to a free Wi-Fi hotspot feels like finding an oasis in the middle of the desert. Who wouldn’t prefer to hop on a free network and browse the hell of the Internet without having to worry about a data limit? Well, just like anything else that’s free, wi-fi comes with a fine print. And its reads “data leaks.”

Read More ...

[fa icon="comment"] 2 Comments

How to reclaim your online privacy in 5 practical steps

[fa icon="calendar'] Nov 14, 2016 10:13:32 AM / by Stefan Topuzov

Make no mistake – your data is being snooped on online. You don’t have to be an international spy to worry about online privacy. Breaches to it could be as mundane as internet providers storing metadata and selling it to third parties, or social networks monitoring your habits in order to offer you targeted advertising. The good news is that you won’t have to burn your smartphone and go live in the woods in order to reclaim online privacy.

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line