Category: Security
Disclosure: Your support helps keep the site running! We earn a referral fee for some of the services we recommend on this page. Learn more
Defending Your Data
It’s easy to take for granted just how easy modern technology makes a lot of our everyday tasks. Before the… Read More...Blackphone Security Features – What Are They And Do You Need Them? [Infographic]
With stories of spying and security breaches all over the news, it seems like privacy concerns are at the forefront… Read More...What Is Doxing? (And Why Is It So Scary?): An Infographic
The World Wide Web has changed a lot over the years, but there’s one immutable thing about it that we… Read More...Think You Won’t Be Hacked? Test The Strength Of Your Computer Security Now
Your wifi is encrypted and a trial version of McAfee came with that new HP the kid at Best Buy sold you, so no need to worry about computer security, right? Unfortunately, security is a whole lot more complex than your average computer user might imagine. Thankfully, however, there are a number of online tools available which will help you identify (and sometimes fix) the vulnerabilities in your system. In this article we've selected 12 basic tests you can run on your machine to identify its weaknesses.Don’t Get Blackmailed: Protect The Images You Share Online Now
Instant photo sharing is so ubiquitous today, it’s easy to forget that it was alien to us just a few… Read More...7 Free Wifi Safety Steps And How To Implement Them [Infographic]
It’s hard to believe that until the 2000s, the only way that most people could get online was by hooking… Read More...Complete Guide To Deleting Files FOREVER [100% Destroyed Guarantee]
Can a file really be deleted forever? What exactly happens when you “delete” a file, and how easy is it… Read More...
Ever been frustrated by the ancient technology you’re forced to use at the office? Tech geeks have it especially tough.… Read More...How to Establish a BYOD Policy
Today's online culture of banking, blogging, social networking and shopping makes it easier than ever for those with nefarious intentions to steal your personal information. Social Security numbers, credit cards and online passwords are all at risk if you don't keep your personal information secure both online and off.The Privacy Toolbox: 100 Guides and Resources for Keeping Your Personal Information Safe
When shopping for a new computer, your mind is probably spinning with considerations: price, reliability, speed, software capabilities, security, and other specs. Perhaps the hardest part is choosing an operating system on which everything will run. To get a good idea of what capabilities Apple's OSX Tiger/Leopard, Windows Vista, and Ubuntu Linux have to offer, check out our 15 point report card that compares the levels of protection you'll get with each of them.OSX Tiger vs. Vista vs. Ubuntu Security: a 15 Point Report Card