encryption

,

Three Steps to Securing Your Wi-Fi

Wi-Fi is great. It’s convenient, allows for widespread coverage, increases the portability of devices and is cost-effective. But wireless networks — especially in your home — are also a common target for hackers trying to steal your personal information. To protect your wireless network from unauthorized access, simply follow these three steps.

,

How to Send a Secure Email

Even though they probably should be more careful, people send confidential information through email all the time. Today, I’d like to share with you a simple, secure and free way to encrypt any email that contains sensitive information.

,

The Only Email System the NSA Can’t Access

When the NSA surveillance news broke last year it sent shockwaves through CERN, the particle physics laboratory in Switzerland. Andy Yen, a PhD student, took to the Young at CERN Facebook group with a simple message: “I am very concerned about the privacy issue, and I was wondering what I could do about it.” There …

,

Why You’re Probably on an NSA Watchlist

I was talking with one of my colleagues the other day, and he raised a very interesting question, one that deserves consideration by anyone worried about their digital privacy. He read an article that championed the idea that the more steps one took to protect their privacy by using anonymous Web-browsing tools like Tor, the …

,

The End of the Deep Web? Nope.

It was a wild ride last week in the world of the Deep Web, that section of the Internet that requires special tools to access. The feds took down the site called Silk Road and claim to have arrested its founder and administrator. The news streams were filled with lurid tales of derring-do in this …

//