December 6, 2019

Cryptojacking – A Beginner’s Explanation

Have you ever felt like your device was abnormally overheating or slowing down more than usual? Hackers could be secretly using your device to mine cryptocurrencies by using scripts to steal your computer processing power and cloud CPU usage. A computer script is a list of commands that are executed by a certain […]
November 22, 2019

10 Reasons Reddit Users Gave For Using a VPN

There are a variety of reasons that Internet users will choose to use a Virtual Private Network (VPN) while they are online. For these Reddit users, these are their motivations for using a VPN:   1) “If someone is going to see my internet habits, it’s going to be someone I choose damnit.” […]
November 16, 2019

Myth: “Hackers Only Target High-Profile VIPs & Huge Companies”

There are plenty of tips and advice floating about the Internet on digital privacy and security. While some of these are well-intended to help, there are also plenty of widely-believed misconceptions that netizens continue to believe. A common mistaken belief among many is that hackers will only target the rich and wealthy. Similarly, […]
November 9, 2019

5 Hidden Dangers When Using VPNs

A Virtual Private Network (VPN) is a great tool if you are looking to secure and privatise your online activity. However, in what may seem like an oxymoron, there are many hidden dangers when using VPNs if you are using an untrustworthy provider. There are thousands of free VPNs out there, and even […]
November 2, 2019

Can a VPN Be Hacked?

A Virtual Private Network (VPN) was made to serve as a way for Internet users to securely encrypt your online communications from being compromised. With its main purpose of keeping your data from being hacked by outsiders looking to peer in to your network, it raises the question, “If you depend on it […]
October 27, 2019

What is Tails OS? A Beginner’s Explanation

This is an introduction to the Tails OS; a purpose-built, security-focused operating system which you can use to protect your work. Common operating systems in use are typically Windows, Mac OS, or commercial smartphone systems like Android or iOS. With these operating systems, there are issues if you are doing work which requires […]
October 17, 2019

Digital Signatures & Digital Certificates: A Beginner’s Explanation

What are digital signatures and digital certificates? Digital signatures rely on asymmetric key cryptography. Before we go into digital signatures, let’s briefly go into how asymmetric key cryptography works.   ASYMMETRIC KEY CRYPTOGRAPHY With asymmetric key cryptography, there is a pair of mathematically related keys. If you encrypt a message with one of […]
October 5, 2019

The One Simple Method to Block Mobile Ads Tracking

These days, whatever you do on the Internet easily ends up building a profile of your likes, behaviour, and demographic. If you are not careful, these digital footprints of whatever you do online winds up being traced back to you and served to you in the form of targeted advertising. Online ads seem […]