Home » Image » Page 17

Image

HeartBleed Changed Passwords: Change Your Online Security Policy

  • News
  • 5 min read

I changed all my passwords after Heartbleed hit. A couple times. A part of my personal online security policy is to use a password generation and storage app. I use LastPass as it keeps my passwords varied and strong. The majority of web users…not so much. The most common passwords are still:

  • password
  • qwerty
  • 123456
  • 11111
  • monkey
  • abc123
  • letmein

Read More »HeartBleed Changed Passwords: Change Your Online Security Policy

Pregnant Mother seeks Privacy from Big Data

A big reason why so many people love using a VPN is because it helps them stay anonymous online. This gives them privacy – a fundamental right of everyone on earth. Even the most barbarous of dictators wouldn’t openly admit to wanting to put a camera into the home of all their subjects.

Yet that is exactly what the governments and corporations of the world are doing with your online activities through various acts known collectively as Big Data. They’re tracking your online activities, taking this information from you, and selling it to marketers. Read that again: they’re using you. But a VPN can help you get privacy from Big Data.Read More »Pregnant Mother seeks Privacy from Big Data

Covert Redirect logo

Covert Redirect: Definitely NOT The New Heartbleed

  • News
  • 3 min read

News organizations reporting on it, a fancy looking website (ok, not as pretty as Heartbleed), a sexy logo, and blog posts a plenty saying that the online sky is falling is having many thinking that the OpenID and OAuth flaws, known as Covert Redirect, are the new HeartBleed.

Where Heartbleed was a genuine security flaw that jeopardized the personal information of approximately everyone who goes online, the Covert Redirect flaw is one that has been known about and dealt with already.

Read More »Covert Redirect: Definitely NOT The New Heartbleed

Protect Your Online Data With These 5 Easy to Follow Tips

Hackers, corporations, and government agencies have a hundred different ways to steal your online data. Your computer has open doors all over, just begging someone to walk right through it – findings ways to protect your online data is more important than ever.

When it comes to protecting your online data, your job is to go around and close as many of those doors as possible. I was reading a recent article over on esecurityplanet.com which stated that 88 percent of surveyed web users are at least “a little” concerned about the data that they have online. This article will look at helping you get out of that mass of confused people, and get your data secure.

Read More »Protect Your Online Data With These 5 Easy to Follow Tips

How do Online Activists Benefit From a VPN?

Many people falsely believed that the only threat they face online is a hacker or a computer virus. This turned out to not be the case as governments the world over have been found to be using the Internet to track people’s information and do mass surveillance. You can be sure that they’re following the activity of online activists, especially in more restrictive countries. Do not fool yourself, these restrictive countries can include both the UK and the USA.

Even the most common of online activist activities can be tracked and used against you if you don’t protect yourself. This is where a VPN service comes in handy.
Read More »How do Online Activists Benefit From a VPN?

Internet Security Myths, Misinformation, the NSA and Encryption

Internet security myths have gone through the roof recently. I even recently read an article on another website, that I won’t name because I’d rather not start a flame war, which took these myths and made them ‘facts.’ The most maddening thing was that the article had no back-up proof or references about the claims it made.

I’m going to look at a few points made in this other article as it will address a few common VPN facts, internet security myths and spying myths that are floating around out there.

Read More »Internet Security Myths, Misinformation, the NSA and Encryption