Home » Blog

Blog

Online Security for Kids: Having “The Talk” Before Anything Happens

A few short years ago I became an uncle for the first time. This was a pretty big deal as I had, and have, no kids of my own. I’m what they call “an eternal bachelor.” Think Barney Stinson, but with more comic books and nerdy cyber-ness …and slightly fewer ladies.

My brother, the father of said nephew of mine, is a roofer. He understands the architecture of homes perfectly well, but not the Internet. It came down to me to talk with his son when he became old enough recently to use the Internet. That’s what has caused me to write the online security for kids guide below.Read More »Online Security for Kids: Having “The Talk” Before Anything Happens

The 10 Best/Worst Online Security Myths that STILL Exist

  • News
  • 6 min read

Many people see the Internet as this mysterious place that feeds them information and porn whenever they push the right keys to do that. The basics of how the Internet works, and who has built it, seems to elude most people and this has lead to any number of online security myths being created.

Here are ten of the best/worst online security myths that still exist today. Read it to upgrade your nerd level, and downgrade your ignorance level.
Read More »The 10 Best/Worst Online Security Myths that STILL Exist

Conference CyberSecurity: Keyloggers and Man in the Middle Attacks

There are two common security problems at conferences, and in public in general, that you can protect yourself from with some basic security measures. Conference security is becoming increasingly important as more people not only attend these conferences, but also work remotely in general.

I’m going to look at two conference security issues which you may encounter the next time you’re looking to log onto a public wifi that has been provided, or use a public computer room that is set up for your use.Read More »Conference CyberSecurity: Keyloggers and Man in the Middle Attacks

Are Online Banking Apps Secure? Think Again…

Hi, my name’s Marcus and I could steal your money. How? Easily: through the online banking app that is on your mobile device. If you’re thinking that I must be a handsome computer hacking genius, deciphering code in an exciting visual way like Hugh Jackman in Swordfish, well…

All you’d be right about is “handsome.” 😉

Hacking the mobile apps of the most well known banks in the world is easy thanks to the fact that:

  1. The average online banking app is not particularly well made from a security perspective.
  2. Many online tutorials exist to direct even the most novice of internet hackers, with free software available.
  3. You think that you’re safe in your online banking app, and act accordingly.

Out of all of these your ignorance is the worst offender, followed by how poorly most of these banking apps are made.Read More »Are Online Banking Apps Secure? Think Again…

UK Internet Censorship Blocks up to 20% of all Websites

  • News
  • 5 min read

We usually think of places like China, North Korea, and other repressive dictatorships when we think of Internet censorship. UK Internet censorship is, however, reportedly blocking up to 20% off websites online. This information comes courtesy of the Open Rights Group, and it is damning of the UK’s handling of the Internet, and its desire to give its citizens true freedom.
Read More »UK Internet Censorship Blocks up to 20% of all Websites

Get to Know VPN Encryption Protocols – Pros and Cons

Your VPN uses a certain encryption protocol – or gives you several to select from – to encrypt your data. But what does it all mean, what are they, and what is each one good at? We’ll explore that in this article so that you know more about your VPN client. You can then use the strengths of each of the different VPN encryption protocols to your advantage.

Get to Know VPN Encryption Protocols – Pros and Cons

I’m going to do this in point form bullet notes of pros and cons at first. If you want to learn more, simply scroll down to the conclusion for my summary. Read More »Get to Know VPN Encryption Protocols – Pros and Cons

ISP Slowdown & Blocking: 3 Important Uses of a VPN Service

  • News
  • 4 min read

Your VPN service isn’t all about encryption and hiding your IP address, it is also useful for a number of other important functions that will greatly increase your enjoyment of the internet. You may not be aware of this, but your ISP may be working against the internet that you’re paying them for!

Stay tuned until the end of this article to check out one of my favorite TV shows that a VPN helps me to connect to.Read More »ISP Slowdown & Blocking: 3 Important Uses of a VPN Service