Facial Recognition And Surveillance

ID checks were a common response to the terrorist attacks of 9/11, but they’ll soon be obsolete. You won’t have to show your ID, because you’ll be identified automatically. A security camera will capture your face, and it’ll be matched with your name and a whole lot of other information besides. Welcome to the world

Malware Removal Tests

These tests focus only on the malware removal/cleaning capabilities, therefore all used samples are samples that the tested Anti-Virus products are able to detect. It has nothing to do with detection rates or protection capabilities. Of course, if an Anti-Virus is not able to detect the malware, it is also not able to remove it.The

I owned google.com for 5 minutes

Sanmay Ved was searching for available .com domains and discovered the availability of Google.com … then he bought it, but something happened … This story is amazing and difficult to believe …. an individual managed to buy the Google.com domain and now I’ll tell you how.

Stealing Fingerprints

Fingerprints are another type of data entirely. They’re used to identify people at crime scenes, but increasingly they’re used as an authentication credential. If you have an iPhone, for example, you probably use your fingerprint to unlock your phone. This type of authentication is increasingly common, replacing a password—something you know—with a biometric: something you

Qubes 3.0

About 5 months after the initial release of Qubes 3.0-rc1, we’re now releasing the final 3.0. Let me quickly recap the main “killer features” of Qubes OS 3.0.

FIPS Security 140-2 Level 3 Certified

That grabbed your attention, didn’t it? What is FIPS Security 140-2? In the US, requirements for government security are regulated by Federal Information Processing Standards (FIPS) publications. Considered a benchmark for security in government, FIPS validation assures users that a given technology has passed rigorous testing. FIPS 140-2 identifies eleven areas for a cryptographic module

Expert Linux Firewalling

This tutorial is not intended for newcomers Yes, Linux is secure, and we all know that. But we shouldn’t stop talking about it’s default Firewall, Netfilter, and how to properly configure it. By default, Netfilter and it’s front-end Iptables are configured in such way that they accept all incoming/out-going connections. For me this is ridiculous

Critical TrueCrypt Flaws

And so it begins. Recently, researchers from Google’s Project Zero team uncovered a pair of elevation of privilege vulnerabilities in TrueCrypt, both of which were patched this weekend in VeraCrypt, one of the remaining free disk encryption software packages for Windows available. VeraCrypt is one of two projects that forked the last available TrueCrypt build—CipherShed

Blackphone 2

  Make no mistake: even if Blackphone 2 is a big step up from its predecessor, this still isn’t for everyone. This phone is sleek, subtle, and usable, but its US$799 price tag is not reflected in its hardware. Instead, you’re paying for security and privacy features that will keep your communications and personal data out of the hands

Learn SQL With Free Three-Hour Course

SQL is the world’s most popular language for managing and manipulating databases. Today, Codecademy launched a free Learn SQL interactive course that will teach you the basics of tables, queries, aggregate functions, and more.

F‑Secure Freedome VPN GIVEAWAY

Freedome creates a secure, encrypted connection from you and your device to the F-Secure Cloud. It makes your connection invisible in the Wi-Fi network and your data unreadable. So even if someone tries to scan what’s up, they can’t tap into what’s yours. When you connect to the Internet, your device is assigned a unique

CCleaner Cloud

One of the core differences between regular CCleaner versions and CCleaner Cloud is that the control center has been moved to the web so that you can control one or multiple computer systems remotely. Access requires a modern web browser only but no software installation on the control system so that you can control Windows

Are security cameras a security risk?

Corporations, small business owners, and home-owners alike all have a variety of valid reasons to deploy surveillance systems. There are many options with just as many price points making surveillance practical for just about everyone. This convenience can come at price for those who are not technologically or security savvy. Deploying a surveillance system is

Privacy Tools

Over the last 16 months, as I’ve debated this issue around the world, every single time somebody has said to me, “I don’t really worry about invasions of privacy because I don’t have anything to hide.” I always say the same thing to them. I get out a pen, I write down my email address.


OpenPuff Steganography and Watermarking, sometimes abbreviated as OpenPuff or Puff, is a freeware steganography tool for Microsoft Windows and still maintained as independent software. The program is notable for being the first steganography tool (version 1.01 released on December 2004) that: lets users hide data in more than a single carrier file. When hidden data