While Microsoft is offering for free it new Windows 10 OS, security experts argue that the cost for user privacy is much higher. Microsoft Windows 10 is the new operating system of the IT giant, the newborn already reached more than 14 million downloads in just two days. The experts who have already analyzed Windows 10 […]
A group of six academics has developed Hornet, a new high-speed anonymity network that promises to be a valid alternative to the popular Tor network. Hornet allows for anonymous web surfing protecting the user’s privacy. The principal advantage HORNET has respect other anonymizing networks like Tor, is the speed. The Hornet is able to manage anonymous traffic […]
ProxyHam is a hardware device designed by a group of researchers to allow anonymous connections to Wi-Fi from about 2.5 Miles away. Security researcher Benjamin Caudill has designed a device that allows to keep anonymous users online experience, an amazing system for the anonymity of whistleblowers, journalists and dissidents. Caudill named his device ProxyHam, it’s a “hardware […]
What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Letâs begin by explaining what the so called âDark Webâ actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]
The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]
The Data âcrown jewelsâ on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]
According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]
Marauderâs Map is the name of a Chrome extension developed by Aran Khanna to simply track Facebook users using Facebook Messanger data. A student from Cambridge, Aran Khanna, has developed a Chrome extension that allows tracking Facebook friends on map. The developer named the extension Marauderâs Map as the magical Marauderâs Map from the Harry Potter books that reveals all of […]
The UK Government is giving GCHQ, Intelligence services and law enforcement full hacking powers. People are scared by a law that gives GCHQ the immunity. New legislation exempting police, GCHQ and other officers from intelligence department from prosecution in a connection to mobile and computer hacking by the said government guns, has been passed by […]
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, âThe Amnesiac Incognito Live System,âversion 1.4Â is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]