IPVanish Adds Bitcoin, Popular CyptoCurrency, as Payment Option
Fans of IPVanish, one of the best
Fans of IPVanish, one of the best
A few short years ago I became an uncle for the first time. This was a pretty big deal as I had, and have, no kids of my own. I’m what they call “an eternal bachelor.” Think Barney Stinson, but with more comic books and nerdy cyber-ness …and slightly fewer ladies.
My brother, the father of said nephew of mine, is a roofer. He understands the architecture of homes perfectly well, but not the Internet. It came down to me to talk with his son when he became old enough recently to use the Internet. That’s what has caused me to write the online security for kids guide below.Read More »Online Security for Kids: Having “The Talk” Before Anything Happens
Many people see the Internet as this mysterious place that feeds them information and porn whenever they push the right keys to do that. The basics of how the Internet works, and who has built it, seems to elude most people and this has lead to any number of online security myths being created.
Here are ten of the best/worst online security myths that still exist today. Read it to upgrade your nerd level, and downgrade your ignorance level.
Read More »The 10 Best/Worst Online Security Myths that STILL Exist
There are two common security problems at conferences, and in public in general, that you can protect yourself from with some basic security measures. Conference security is becoming increasingly important as more people not only attend these conferences, but also work remotely in general.
I’m going to look at two conference security issues which you may encounter the next time you’re looking to log onto a public wifi that has been provided, or use a public computer room that is set up for your use.Read More »Conference CyberSecurity: Keyloggers and Man in the Middle Attacks
Hi, my name’s Marcus and I could steal your money. How? Easily: through the online banking app that is on your mobile device. If you’re thinking that I must be a handsome computer hacking genius, deciphering code in an exciting visual way like Hugh Jackman in Swordfish, well…
All you’d be right about is “handsome.” 😉
Hacking the mobile apps of the most well known banks in the world is easy thanks to the fact that:
Out of all of these your ignorance is the worst offender, followed by how poorly most of these banking apps are made.Read More »Are Online Banking Apps Secure? Think Again…
Your
I’m going to do this in point form bullet notes of pros and cons at first. If you want to learn more, simply scroll down to the conclusion for my summary. Read More »Get to Know VPN Encryption Protocols – Pros and Cons
Using VPNs is an effective way to protect yourself from intrusion when browsing online, but they are not foolproof. A disruption in their operation can leave your connection and browsing activities exposed. This is where… Read More »What is an Internet/VPN Kill Switch?
Protecting yourself, and your valuable online data, is an essential in this increasingly hazardous online world. In this article I will look at 5 online security tools that you can use to protect yourself.
Read More »Choose the Best Online Security Tool to Protect Your Data
I changed all my passwords after Heartbleed hit. A couple times. A part of my personal online security policy is to use a password generation and storage app. I use LastPass as it keeps my passwords varied and strong. The majority of web users…not so much. The most common passwords are still:
Read More »HeartBleed Changed Passwords: Change Your Online Security Policy
A big reason why so many people love using a
Yet that is exactly what the governments and corporations of the world are doing with your online activities through various acts known collectively as Big Data. They’re tracking your online activities, taking this information from you, and selling it to marketers. Read that again: they’re using you. But a