Mar
31

3 Types Of Cyberattacks & How to Avoid Them

We’ve seen the headlines and heard about the horrors lurking beneath cyberattacks like Cryptolocker, FREAK and even Heartbleed. But, what’s the difference among these cyberattacks and even more importantly what can you do to try […]

Mar
26

Gazon SMS Virus Impacts Android

Viruses, they’re not just for desktops. As cybercriminals explore other ways to exploit users they’ve started to branch out across platforms. By using a combination of techniques pulled from old viruses and worms a new […]

Mar
16

Bolster Online Privacy With The iCloak USB

Whether you’re using public WiFi or a friend’s computer chances are that you’ve questioned the security of your experience. Are hackers tracking your digital activity? Are you logging in through a legitimate portal? Well, finding […]

Feb
3

Why Not All Bittorrent Files Are Created Equal

  If you’ve been torrenting for awhile you’ve most likely discovered that depending on what you’re searching for there’s more than one version of any given torrent file. Author C.S. Forester’s famed 11-book series Horatio […]

Sep
16

3 Alternative Privacy Based Web Browsers To Try

Apart from the major web browsers — Chrome, Firefox, Safari, IE — there’s a mountain of other browsers available that focus on all sorts of different aspects. For instance, there’s Coowon for gamers and Midori […]

Jun
17

How To Protect Yourself From Ransomware

Ransomware isn’t something new, but it has been making news headlines more often. As hackers become more advanced they’re able to bypass security protocols and infiltrate systems and platforms at large. Unsettling to say the […]