IPVanish Adds Bitcoin, Popular CyptoCurrency, as Payment Option
Fans of IPVanish, one of the best
Fans of IPVanish, one of the best
A
A few short years ago I became an uncle for the first time. This was a pretty big deal as I had, and have, no kids of my own. I’m what they call “an eternal bachelor.” Think Barney Stinson, but with more comic books and nerdy cyber-ness …and slightly fewer ladies.
My brother, the father of said nephew of mine, is a roofer. He understands the architecture of homes perfectly well, but not the Internet. It came down to me to talk with his son when he became old enough recently to use the Internet. That’s what has caused me to write the online security for kids guide below.Read More »Online Security for Kids: Having “The Talk” Before Anything Happens
Many people see the Internet as this mysterious place that feeds them information and porn whenever they push the right keys to do that. The basics of how the Internet works, and who has built it, seems to elude most people and this has lead to any number of online security myths being created.
Here are ten of the best/worst online security myths that still exist today. Read it to upgrade your nerd level, and downgrade your ignorance level.
Read More »The 10 Best/Worst Online Security Myths that STILL Exist
There are two common security problems at conferences, and in public in general, that you can protect yourself from with some basic security measures. Conference security is becoming increasingly important as more people not only attend these conferences, but also work remotely in general.
I’m going to look at two conference security issues which you may encounter the next time you’re looking to log onto a public wifi that has been provided, or use a public computer room that is set up for your use.Read More »Conference CyberSecurity: Keyloggers and Man in the Middle Attacks
Hi, my name’s Marcus and I could steal your money. How? Easily: through the online banking app that is on your mobile device. If you’re thinking that I must be a handsome computer hacking genius, deciphering code in an exciting visual way like Hugh Jackman in Swordfish, well…
All you’d be right about is “handsome.” 😉
Hacking the mobile apps of the most well known banks in the world is easy thanks to the fact that:
Out of all of these your ignorance is the worst offender, followed by how poorly most of these banking apps are made.Read More »Are Online Banking Apps Secure? Think Again…
We usually think of places like China, North Korea, and other repressive dictatorships when we think of Internet censorship. UK Internet censorship is, however, reportedly blocking up to 20% off websites online. This information comes courtesy of the Open Rights Group, and it is damning of the UK’s handling of the Internet, and its desire to give its citizens true freedom.
Read More »UK Internet Censorship Blocks up to 20% of all Websites
Your
I’m going to do this in point form bullet notes of pros and cons at first. If you want to learn more, simply scroll down to the conclusion for my summary. Read More »Get to Know VPN Encryption Protocols – Pros and Cons
Your
Stay tuned until the end of this article to check out one of my favorite TV shows that a
There are a number of countries which look to restrict the ability of their citizens to communicate, and censor the Internet. Is Skype blocked in your country? You must live in, or be vacationing in, any one of these countries which have blocked Skype in the past, or who are blocking Skype right now:
Read More »Is Your Skype Blocked: How it’s Done, and How to Get Past Skype Blocking