UK ministers urge internet users to increase online security

UK ministers urge internet users to increase online security

And less than half of those surveyed do not always use a strong, separate password for their main email account. NCSC’s Technical Director Dr Ian Levy added: "Password re-use is a major risk that can be avoided - nobody should protect sensitive data with something that can be guessed, like their first name, local football team or favourite band.

Hacker Breaks Into French Government's New Secure Messaging App

Hacker Breaks Into French Government's New Secure Messaging App

Dubbed " Tchap ," the end-to-end encrypted, open source messaging app has been created by the French government with an aim to keep their officials, parliamentarians and ministers data on servers inside the country over concerns that foreign agencies could use other services to spy on their communications.

Purism’s Librem 5 Progress in Videos

Purism’s Librem 5 Progress in Videos

Using the Librem 5 chat application to send and receive sms text messages (and hello world). Librem 5 devkit to devkit calling.

DARPA is Working on an Anonymous Mobile Communication System

DARPA is Working on an Anonymous Mobile Communication System

The United States’ Defense Advanced Research Projects Agency (DARPA) is behind the many innovative and useful technologies such as Unix, GPS, Tor, etc. Read More: DARPA is Developing a Secure Open Source Voting System.

Cybersecurity Apps that will be Helpful in 2019

Cybersecurity Apps that will be Helpful in 2019

In case you would like to know what services a computer is running for network inventory purposes and managing service upgrades or to check which ports are open on a system and if those ports can be exploited in simulated attacks, then this is the right tool to implement a security strategy.

Former Mozilla exec: Google has sabotaged Firefox for years

Former Mozilla exec: Google has sabotaged Firefox for years

"When I started at Mozilla in 2007 there was no Google Chrome, and most folks we spoke with inside [Google] were Firefox fans," Nightingale recollected in a Twitter thread on Saturday.

How to make Your Router More Secure on the Internet

How to make Your Router More Secure on the Internet

Michael Horowitz, a router security expert, wrote, "I think it is a mistake to use a consumer router. Horowitz says that manufacturers of consumer-grade routers are concerned with making a profit, not with making secure routers.

“Blockchain in Cybersecurity: The future?” (From our Forums.)

“Blockchain in Cybersecurity: The future?” (From our Forums.)

NASA has decided to use blockchain technology as a way of enhancing security and minimizing denial of service and other different traffic service attacks. Also, blockchain security means there is no centralized authority in control of the network to verify the data going through it which makes it hard for hackers to orchestrate an attack.

A “Brave” New World

A “Brave” New World

So if you install Brave and spend time on , you can express thanks in the form of a tiny tip, right there in your browser. A way for the Internet Archive to support a like-minded tech organization, and at the very least, try out something new.

Researchers Tried To Crack An Android Phone To See If FBI Could

Researchers Tried To Crack An Android Phone To See If FBI Could

Data encryption on smartphones involves a key that the phone creates by combining 1) a user’s unlock code, if any (often a four- to six-digit passcode), and 2) a long, complicated number specific to the individual device being used.

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's New MacBook Disconnects Microphone "Physically" When Lid is Closed

Apple's custom T2 security chip in the latest MacBooks includes a new hardware feature that physically disconnects the MacBook's built-in microphone whenever the user closes the lid, the company revealed yesterday at its event at the Brooklyn Academy of Music in New York.

Is Russia’s Internet ban an elaborate ploy to block Telegram?

Is Russia’s Internet ban an elaborate ploy to block Telegram?

Russian lawmakers on Thursday approved a controversial bill to cut off the country’s internet traffic from foreign servers and block popular messaging app, Telegram. Telegram is insanely popular in Russia, where its encrypted technology makes it possible for people to communicate without government snooping, and for protest organizers to operate with impunity.

Dr. A. Estwick: Safety of Your Personal Data Online Is a Life-And-Death Issue

Dr. A. Estwick: Safety of Your Personal Data Online Is a Life-And-Death Issue

‘Until we get serious, until we get to a point where there’s enough education [...], unfortunately, we’ll keep hearing about data breaches, but there won’t be too much action afterward’, - says Dr. Amelia Estwick, the Program Director at the National Cybersecurity Institute at Excelsior College (NCI).Dr. Estwick has an impressive 20-year long career, she entered the industry before the term ‘cybersecurity’ appeared in our lexicon.

The Full Guide to Securing Your Data Over Wi-Fi

The Full Guide to Securing Your Data Over Wi-Fi

The hacker then connects to a real access point using a different wireless card, effectively funneling all of the information through their system before moving it along to the second network.

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers. Critics say implementing the measures would be expensive and give vast censorship powers to the government’s new traffic monitoring centre.

The Challenges Facing Privacy Apps

The Challenges Facing Privacy Apps

Using software that is open source is a critical piece of the puzzle, because this allows peer review to verify that the developer isn’t collecting unnecessary data to make the app or service work, and that the developers have considered all of the external privacy threats.

Encrypt that SNI: Firefox edition

Encrypt that SNI: Firefox edition

As promised, our friends at Mozilla landed support for ESNI in Firefox Nightly, so you can now browse Cloudflare websites without leaking the plaintext SNI TLS extension to on-path observers (ISPs, coffee-shop owners, firewalls, …).

List of alternative services that truly respect your privacy

List of alternative services that truly respect your privacy

Telegram, WhatsApp, Facebook Messenger, The main issue with using Telegram is that they use a slightly less secure encryption protocol than that used by Signal. The main issue with WhatsApp and Facebook messenger, though they use strong end-to-end encryption by default (just like Signal), is their collection of metadata.

Should you be concerned about LastPass uploading your passwords to its server?

Should you be concerned about LastPass uploading your passwords to its server?

No changes to any of the other actions which will provide the server with the key to decrypt your data: Opening Account Settings, Security Challenge, History, Bookmarklets, Credit Monitoring Linking to a personal account Adding an identity Importing data if the binary component isn’t installed Printing all sites Some of these actions will prompt you to re-enter your master password.

How to Sweep For Bugs and Hidden Cameras

How to Sweep For Bugs and Hidden Cameras

Bugs always need a way to deliver the data they're gathering to their owners, so deep bug sweeps should go beyond regular electronics detection to scan for laser beam and microwave transmission setups.

Swiss Post puts e-voting on hold after researchers uncover critical security errors

Swiss Post puts e-voting on hold after researchers uncover critical security errors

The researchers did not participate in the public intrusion test, but it was clear that their findings could not be ignored.“Although the electronic ballot box could not be hacked, feedback on the published source code reveals critical errors,” Swiss Post said in a statement last week.

Introducing Warp: Fixing Mobile Internet Performance and Security

Introducing Warp: Fixing Mobile Internet Performance and Security

One silver lining is that if you browse the unencrypted Internet through Warp, when it’s safe to do so, Cloudflare’s network can cache and compress content to improve performance and potentially decrease your data usage and mobile carrier bill.

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

Private Internet Access (PIA) VPN Service Forges First OEM Partnership with Purism to Offer Hardware and Software Bundles with Powerful Privacy Protection

“Combining our privacy protecting VPN capabilities with Purism’s line of products will provide the ultimate security package to users,” said Ted Kim, CEO of Private Internet Access.

Millions of Facebook records were exposed on public Amazon server

Millions of Facebook records were exposed on public Amazon server

James Martin/CNET A treasure trove of data containing more than 540 million records was exposed online in a public database, security researchers from UpGuard said Wednesday. The exposed database for At the Pool contained data including photos, events and passwords, though UpGuard believes the passwords stored were for the app, not for Facebook accounts.

How the EverCrypt Library Creates Hacker-Proof Cryptography

How the EverCrypt Library Creates Hacker-Proof Cryptography

“When we say proof, we mean we prove that our code can’t suffer these kinds of attacks,” said Karthik Bhargavan, a computer scientist at Inria in Paris who worked on EverCrypt.

MLS and Federated Messaging

MLS and Federated Messaging

For messaging with only two participants, Loki Messenger has both an Asynchronous mode using Swarm storage on the Service Node network, and a faster Synchronous mode which allows users to send messages directly to each other via Lokinet.

How I Became Untraceable on the Web.

How I Became Untraceable on the Web.

It’s pretty simple: If John selects France on his VPN service, all his data will first go through one of the servers of his VPN provider in France and then “reach” the website. It’s really great for privacy, but the user interface is horrible.

HTTPS Isn't Always As Secure As It Seems

HTTPS Isn't Always As Secure As It Seems

Vulnerabilities that are full-on "leaky" involve more deeply flawed encryption channels between browsers and web servers that would enable an attacker to decrypt all the traffic passing through them.

Privacy Guide

Privacy Guide

GRUB_CMDLINE_LINUX_DEFAULT="apparmor=1 security=apparmor slab_nomerge slub_debug=FZP mce=0 page_poison=1 vsyscall=none ipv6.disable=1 audit=1". You should use apparmor with the Tor Browser to increase security. You should also configure the proxy settings of the Tor Browser so you can use stream isolation.

Protecting yourself from the ‘things’ on your home network

Protecting yourself from the ‘things’ on your home network

Sivan Rauscher, co-founder and CEO of the Israeli-based B2B startup SAM Seamless Network, said in a telephone interview, that hackers target IoT devices because they are easy to hack: As more of our daily lives become more connected and dependent on the web, the sheer number of devices and endpoints in your home makes likely it likely that some of these attacks will succeed.

More