-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
How much can metadata reveal? Just ask John McAfee
Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
OnionShare: Secure and anonymous file sharing
Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...
-
Guide to stronger passwords – Part 3 (Diceware)
This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...
-
Guide to stronger passwords, Part 2 (password managers)
This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...
-
Guide to stronger passwords, Part 1 (two-factor authentication)
This is Part 1 of our stronger password series. For the other parts, click below: Part 2 (Password Managers) Part 3 (Diceware) ExpressVPN has written a three-part series in which we highlight three ea...
-
How to keep your messages private and anonymous
Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...
-
Tails 2.0 installation and review
This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...
-
Six big data security predictions for 2016
2015 was full of newsworthy cybersecurity breaches. Hackers revealed the names and credit card details of 33 million people who frequented the online-cheating website Ashley Madison. Researchers demon...