-
Do I need antivirus on my computer?
Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...
-
What the Panama Leak means for corruption and privacy
Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...
-
Internet hacks: Brute-force attacks and how to stop them
A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...
-
What is a man-in-the-middle (MITM) attack?
A man-in-the-middle attack (also described as monster-in-the-middle, or MITM) describes a very specific attack in which the attacker sits between the two victims (in this case, you and the server). Bo...
-
How much can metadata reveal? Just ask John McAfee
Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...
-
The court case that will define technology and privacy for decades
On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...
-
OnionShare: Secure and anonymous file sharing
Sharing files can be a hassle. Even when in the same room as the person you want to share files with, the easiest option is often to share them with a USB stick. But when you’re hundreds or thousand...
-
Guide to stronger passwords – Part 3 (Diceware)
This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...
-
Guide to stronger passwords, Part 2 (password managers)
This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...
-
Guide to stronger passwords, Part 1 (two-factor authentication)
This is Part 1 of our stronger password series. For the other parts, click below: Part 2 (Password Managers) Part 3 (Diceware) ExpressVPN has written a three-part series in which we highlight three ea...