• May 31, 2019
  • Glyn Moody
  • Bitcoin, News, Privacy, Security,

How much is good online security worth to you? How about $100,000?

Readers of this blog know that a VPN is an indispensable tool for today’s digital world. VPNs address a key part of the challenge of staying safe online. They protect how data is transmitted between an Internet site and the user’s computer, and help to maintain privacy during transit and more widely. But there are … Continue reading “How much is good online security worth to you? How about $100,000?”

0

  • Dec 17, 2018
  • Ashley Perna
  • General Privacy and Security, Online Activity, Tutorials,

How to Purify Your Device After Clicking a Phishing Link

Clicking on an unknown link is something that can happen to anyone, despite their best intentions. While we all known not to click on suspicious links, it’s still something even the best of us have done at least once in our lives. Maybe you weren’t paying attention to the sender or maybe the hacker was … Continue reading “How to Purify Your Device After Clicking a Phishing Link”

0

  • Nov 29, 2018
  • Summer Hirst
  • General Privacy and Security, Online Activity, Tutorials,

What is Phishing and How Do I Prevent It?

Ever got an email from a Nigerian prince who’s got billions in inheritance but he needs your help to get his money back? Yep, that’s a phishing scam. Phishing is a cybercrime that works by manipulating the psychology of the victim instead of depending on any highly technical tools and coding. Thanks to the simplicity … Continue reading “What is Phishing and How Do I Prevent It?”

0

  • Aug 29, 2017
  • Glyn Moody
  • BitTorrent, Privacy, Programming, Security,

Is this the key to foiling phishing attacks? Spoiler alert: probably

As readers of this blog know, VPNs are a great way to protect your privacy and security. But they address only some of the online threats we all face every day. Another important class of problems are caused by attacks that lead to accounts being taken over, identities being appropriated, data theft and financial losses. … Continue reading “Is this the key to foiling phishing attacks? Spoiler alert: probably”

2