Web Hosting Company DreamHost Targeted by DDoS Attack

In what could be named a coincidence or an organized occurrence, a new development has come to light in the aftermath of the Daily...
Privacy Data Secure Protection Safety Concept

Privacy vs. Anonymity

Privacy and anonymity are vital components of a functioning society. As the internet has shown us, both are necessities even in the modern world.

Russia Has Received No Request for Edward Snowden Extradition to US

The United States has not made any formal request to Russia for the deportation of Edward Snowden as of yet, according to Edward Snowden’s attorney Anatoly Kucherena.
Cashless Society

Cashless Society a Problem for Dark Web Anonymity

It looks as though another crossroad is being passed in contemporary society, one in which cash is becoming more and more a truly antiquated...
Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.

Bail Denied to Alleged NSA Leaker

Alleged National Security Agency leaker Reality Winner was once again denied bail by federal judge Brian Epps after the case prosecutors cautioned that she...

Edward Snowden Wants to Protect Journalists and Sources

Former CIA employee and contractor for the United States government, Edward Snowden is reportedly working to build a hardware tool to protect journalists and whistleblowers from state surveillance and government-sponsored hackers.

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

CyberScrub: For Safe And Secure Data Deletion

Name: CyberScrub Description: CyberScrub is software used for safely and completely erasing data from your drive. It is a fact that erasing data or formatting a hard...
woman holding notebook with app vpn creation Internet protocols for protection private network

VPN Browser Extensions for Chrome Leak Users’ DNS

Recent reports made on cybersecurity have confirmed that DNS requests are being leaked to other entities by VPN tools.Chrome extensions proved to be leaking...

DHS And FBI Employees’ Data Exposed In Hack

A few days ago, hackers have reportedly released more than 20,000 confidential FBI employee data to the internet. The exposure came only a day after...

Spamhaus Hacker Will No Longer Spend Time In Jail

Sven Olaf Kamphuis, the Dutch hacker responsible for the biggest cyber-attack of all time, is apparently a free man once again after most of his sentence was suspended by the court.
The concept of security in the Internet.

Should You Be Buying Your VPN with Cryptocurrency?

Remaining anonymous on the internet is nearly impossible in today’s era of multi-tiered threats.These threats come from all angles and following a solid threat...

WhatsApp Blockage In Brazil

On May 2, 2016, a judge from the state of Sergipe ordered all mobile carriers across Brazil to block the popular messaging service Whatsapp for 72 hours.The ban was supposedly imposed because WhatsApp did not comply with the police and provide information during an ongoing investigation.

DNSChanger Malware Used In Malvertising Campaign

DNSChanger first hit the headlines in 2007, and for the five years that followed, this malware exploit infected millions of computers and networks throughout the world subjecting them to security vulnerabilities and threats.

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...

Security Vulnerabilities Could Let Hackers Access In-Flight Systems

Cyber-hijacking an airplane and taking control of its flight capabilities is a recipe for a thrilling and scary action movie. You know what’s scary? The category for such film is simply an action movie and not a science fiction one. This is because such scenario is certainly possible according to this online security group.
Business button mail lock web security icon email online

Secure Email by Lavabit

The web is currently cluttered with burgeoning secure email platforms that aim to circumvent the long arm of government surveillance.Many of these projects have...
Conceptual hand writing showing How Does It Work Question. Business photo text asking about device or machine operation Tutorial written on Tear Notebook paper placed on the Laptop Marker next to it.

What is SADD.IO and How Does It Work?

On the internet, when people don’t want anyone else to know their browsing history, they use the Tor browser or subscribe to a Virtual...

ProtonMail Adds Bitcoin in Its Payment Methods

ProtonMail is a popular anonymous email service operating from Switzerland and is known for encrypting emails by default.Emails exchanged between the users of this service...

British Hacker Pleads Guilty to Hacking into DoD Satellite Network

A 25-year-old British man was arrested for hacking into the United States Department of Defense system.Sean Caffrey, a resident of Sutton Coldfield in the...

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...

Over 1 Million People Support the Pardon Snowden Campaign

The relentless push to secure a presidential pardon for former National Security Agency (NSA) contractor Edward Snowden has recently reached a new milestone. The Pardon Snowden campaign addressed a petition to outgoing President Barrack Obama.

NSA Whistleblower Edward Snowden At LibrePlanet Conference

A look back in January of this year is the announcement that thrilled, if not shook the earth. The FSF revealed that National Security Agency whistleblower, Edward Snowden, is bound to be the opening keynote for the upcoming LibrePlanet 2016.

Essay: Totalitarian Surveillance in a Grim Dark Future

What happens when a technocratic police state mandates that all communication within its borders must follow only an encryption scheme of which the government...

The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...
FBI Logo

Ruling Says FBI Cannot Collect Foreign Data With A Warrant

Recently, in a landmark ruling that favored privacy, a panel of judges announced that any search warrant sent to Microsoft cannot be applied outside the country’s borders. In the particular case, the appeals court made it clear that Microsoft is not compelled to divulge the email communications that formed part of a drug investigation.

Major Security Breach Leaks Files Of Over 4.1 Million US Government Employees on the...

Almost as if to spite the NSA’s expansion of its Internet “defense” program, or spying to the rest of us, a major data breach...

Choosing The Best Shredders

Name: Bonsaii DocShred C156-C 8-Sheet Micro-Cut Description: As far as physical shredders go, there are several factors that need to be looked into when deciding on...

PGP (Pretty Good Privacy)

Name: PGP (Pretty Good Privacy)Description:PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone...

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

OPM Data Appears To Be For Sale – Is it Legit?

Back in Mid-April, the Office of Personnel Management in the US discovered a major security breach that had caused on the leaking of data...

NSA Planned To Hack App Stores To Track Smartphones

As I write this, just a week remains until the patriot act expires, and the end hopefully comes to years of unconstitutional, unwarranted surveillance...

Warning – Encrypted Messenger IronChat Compromised

A statement from police in the Netherlands that was released on Tuesday confirmed that they had managed to decrypt over a quarter of a...

Whonix or Tails?

Getting on to the dark web can be a bit of a process. You can’t just fire up Chrome, type in an address and...

Analysis: Examining Australian Law Enforcement’s New Encryption Powers

It appears that several Australian agencies are already making use of the contentious encryption laws parliament hurriedly passed in December 2018.A single court order...

Send this to a friend