Time flies like an arrow - Fruit flies like a banana


Israel aims to outgun America in cyber warfare

Israeli cyber-startups are ahead in the global game of security innovation, while China and Russia rule the offensive cyber roost Several regions around the world have emerged as key battlegrounds for cybersecurity, both as a destination for attacks from state and non-state actors, and as hubs of innovation in the fight against these threats. There […]


But now the creator of the dead simple end-to-end encrypted messaging app Signal, Moxie Marlinspike, is on a mission to overcome those limitations, and to create a streamlined digital currency that’s private, easy-to-use, and allows for quick transactions from any device. And while it may feel like the last thing the world needs is yet […]

What is Dual SIM?

Have you encountered Dual SIM smartphones in shops? Do you want to know what makes them useful and how the Dual SIM technology works? Or maybe you already know that, but you still have questions like what makes Dual SIM Dual Standby different from Dual SIM Dual Active? If you want to know what the Dual SIM technology […]

Review – Kaspersky Total Security

2017 was not a good year for Kaspersky and their security products. Although it was a company with a good reputation in the security world, the negative assertions made by the United States and more recently, Great Britain, regarding how Russia is using Kaspersky products to spy on other states, have not done it any […]

Apps Track Users When GPS Is Turned Off

Princeton researchers have developed a proof-of-concept app that can be used to reliably track users even if an app does not access a phone’s GPS data, and the user has purposely turned off GPS services. Researchers say this is possible because modern phones come with a large number of accurate sensors that track a wealth […]

ProtonMail Bridge

What is the ProtonMail IMAP/SMTP Bridge? ProtonMail Bridge is an application that allows you to use your ProtonMail encrypted email account with your favorite desktop email client such as Thunderbird, Apple Mail, or Outlook, while simultaneously retaining the zero-access encryption and end-to-end encryption that ProtonMail provides. The best part is that this does not require […]

Erasing an nvme drive

It’s time to dispose of your SSD drive. Securely, which means wiping your data from the drive. We all [should] know that DBAN can not be used to wipe ANY form of SSD. So, what to do? This post may help point you in the right direction.   We got a “test” laptop from a […]

Necessity is the mother of invention

The work life of adults can be strange and alienating. Case in point: Supervisors of Tom Colella, a 60-year-old electrician working in Perth, Western Australia, knew he stored his company-issued PDA in empty bags of Twisties for an indeterminate amount of time and apparently none of them asked any of the questions such a discovery […]

ProtonMail Encrypted Contact Manager

ProtonMail’s new contact manager uses zero-access encryption in order to protect the details of your contacts. Zero-access encryption means that the protected contact fields are encrypted in such a way that only you are able to decrypt and read them, not even ProtonMail can read them. In our new encrypted contacts manager, the protected contact […]

*privacy not included

A Guide to Make Shopping for Connected Gifts Safer, Easier, and Way More Fun. The holidays,it’s the most wonderful time of the year. Unless you buy a gift that spies on your kid or gets your friend hacked. Wish lists this year will have more connected devices than ever. How do you know if that […]

Android tracking apps

RESEARCHERS AT YALE Privacy Lab and French nonprofit Exodus Privacy have documented the proliferation of tracking software on smartphones, finding that weather, flashlight, rideshare, and dating apps, among others, are infested with dozens of different types of trackers collecting vast amounts of information to better target advertising. Exodus security researchers identified 44 trackers in more […]


Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pen testers and businesses conduct real-world phishing simulations. Also great to set up and use on family and friends to try and educate them. If that’s all too big of a head ache, try this instead. One of the best I’ve seen. But, as […]

Vanish © 1999 – All information on this blog is hereby released into the public domain, with no rights reserved. Frontier Theme