• Nov 29, 2018
  • Summer Hirst
  • General Privacy and Security, Online Activity, Tutorials,

What is Phishing and How Do I Prevent It?

Ever got an email from a Nigerian prince who’s got billions in inheritance but he needs your help to get his money back? Yep, that’s a phishing scam. Phishing is a cybercrime that works by manipulating the psychology of the victim instead of depending on any highly technical tools and coding. Thanks to the simplicity … Continue reading “What is Phishing and How Do I Prevent It?”

0

  • Jul 28, 2018
  • Glyn Moody
  • News, Open Source, Privacy, Programming, Security,

Why Gmail’s new “confidential mode” is not so great for privacy, and potentially awful for the open Web

Gmail is used by well over a billion people worldwide, making it one of the most important online services. Google has recently started rolling out a new design that includes novel features. One of the most interesting of these is the so-called “confidential mode”. At first sight, that sounds like good news for privacy: “With … Continue reading “Why Gmail’s new “confidential mode” is not so great for privacy, and potentially awful for the open Web”

0

DEAD – An attack vector on web services, due to e-mail’s faults due to DNS

Domain Emails Are Dead (DEAD) A security reminder that e-mail and DNS should never be a critical component of a secure system architecture. PROBLEM DEAD is a potential vulnerability in the DNS system that exists due to the poor method in which it was implemented in totality. DNS, which is largely controlled by ICANN, is … Continue reading “DEAD – An attack vector on web services, due to e-mail’s faults due to DNS”

0

  • Aug 29, 2017
  • Glyn Moody
  • BitTorrent, Privacy, Programming, Security,

Is this the key to foiling phishing attacks? Spoiler alert: probably

As readers of this blog know, VPNs are a great way to protect your privacy and security. But they address only some of the online threats we all face every day. Another important class of problems are caused by attacks that lead to accounts being taken over, identities being appropriated, data theft and financial losses. … Continue reading “Is this the key to foiling phishing attacks? Spoiler alert: probably”

2