MIT is the Most Insecure University in the US

Short Bytes: MIT may boast of having one of the smartest bunch of people under one roof, but when it comes to security benchmarks, it does not fair good. In fact, MIT ranks as the worst US university in terms of cyber-security protocols. SecurityScorecard conducted a study of the United States’ universities and looked through the […]

HORNET – Faster and Secure Anonymity Network Than Tor

Most of you must have heard about Tor, which is one of the renowned network based on onion router, delivers a good amount of anonymity and has become one of the popular software for everyday Internet users, activists and journalists who struggle to avoid restriction imposed by the corporate and government sectors. But what’s missing […]

CyberGhost Privacy Accelerator Program Offers €100,000 if You Can Make Web a Secure Place

“How Government secretly read your e-mails with this insane law?“ “Snowden’s Revelations: XKEYSCORE is NSA’s search engine.” “Real-Time Cyber Attacks across the globe. ““NSA’s Privacy Breach: Coming through your front door this time.”These are just a few examples to remind you that you and your network are not as safe as you would wish to be. CyberGhost […]

Google’s Project Vault: A Secure Computer On A Micro SD Card

From the stage of Google I/O 2015, Google’s Regina Duggan introduced something that wants you to forget the passwords and become one yourself. Google’s Project Vault is a secure computer that is entirely contained on a micro SD card. According to Google, this micro SD card format makes sense because mobile is the future and […]

6 Ways to Secure a Wireless Wi-Fi Network

Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless devices anywhere in the house without the clutter of cables.  With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that […]

Anonymous Hijacks Thousands of Insecure Routers to Power Its DDoS Tools

Lack of some elementary security measures can risk your router’s security and this has stemmed to grow into a large-scale denial-of-service (DDoS) attacks using these hacker-controlled routers. A web security firm Incapsula has discovered a new router based botnet Mr Black while investigating some DDoS attacks against its customers since this December. Hackers exploited routers’ […]

New Firefox Features Will Only Support Secure Websites

In a recent blog post, Mozilla has showed its intent to phase out the non-secure websites i.e. the HTTP. Earlier this week, Mozilla announced its plan to favor the websites who have HTTPS enabled. If this happens, the web will be divided in two parts: the HTTPS websites with full functionality and the other HTTP […]

How secure is your smartwatch?

Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

‘Unsend’ Your Text Messages With World’s Most Secured Messaging App

Congratulations people! The app that we had been waiting for the since a long time, has finally arrived.  Regretting a wrong message will soon be a thing of the past with this new messaging app. The wish to “unsend” a drunken message has come true. RakEM, the messaging app developed by New York-based Raketu, allows […]

9 Linux Commands To Be Known To Secure Your Linux From Danger

Linux shell or terminal commands are very powerful and just a simple command could lead one to delete a folder, files or root folder, etc. Linux never asks for confirmation rather it will execute the command right away causing you to lose useful data and information stored in these files and folders. Take a look at the 9 commands and […]

How do open source tools stay secure?

Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is now widely used everywhere, from big enterprises to small businesses. This recorded webinar discusses how to keep open source tools secure,