personal information

,

Three Steps to Securing Your Wi-Fi

Wi-Fi is great. It’s convenient, allows for widespread coverage, increases the portability of devices and is cost-effective. But wireless networks — especially in your home — are also a common target for hackers trying to steal your personal information. To protect your wireless network from unauthorized access, simply follow these three steps.

,

How to Send a Secure Email

Even though they probably should be more careful, people send confidential information through email all the time. Today, I’d like to share with you a simple, secure and free way to encrypt any email that contains sensitive information.

,

Why You’re Probably on an NSA Watchlist

I was talking with one of my colleagues the other day, and he raised a very interesting question, one that deserves consideration by anyone worried about their digital privacy. He read an article that championed the idea that the more steps one took to protect their privacy by using anonymous Web-browsing tools like Tor, the …

,

Privacy Malpractice

The online Internet exchanges created by the Affordable Care Act are up and running. OK, they’re up. Uhh, OK, some of them are sort of up. It has been almost a week since last Tuesday’s initial launch, and there have been more than a few problems. Website crashes, excessive response times and other problems have …

//