By now, the entire world has heard about the celebrity nude photo hack. Images of Jennifer Lawrence, Kate Upton, and a few others were leaked first on 4Chan (the worst place to ever exist), and spread further on Reddit. It’s believed that this happened through the iCloud, and points to why you need to secure your iCloud account.Read More »Secure your iCloud Account: Don’t be the Next Photo Leaked!
Fans of IPVanish, one of the best
A few short years ago I became an uncle for the first time. This was a pretty big deal as I had, and have, no kids of my own. I’m what they call “an eternal bachelor.” Think Barney Stinson, but with more comic books and nerdy cyber-ness …and slightly fewer ladies.
My brother, the father of said nephew of mine, is a roofer. He understands the architecture of homes perfectly well, but not the Internet. It came down to me to talk with his son when he became old enough recently to use the Internet. That’s what has caused me to write the online security for kids guide below.Read More »Online Security for Kids: Having “The Talk” Before Anything Happens
Many people see the Internet as this mysterious place that feeds them information and porn whenever they push the right keys to do that. The basics of how the Internet works, and who has built it, seems to elude most people and this has lead to any number of online security myths being created.
Here are ten of the best/worst online security myths that still exist today. Read it to upgrade your nerd level, and downgrade your ignorance level.
Read More »The 10 Best/Worst Online Security Myths that STILL Exist
Hi, my name’s Marcus and I could steal your money. How? Easily: through the online banking app that is on your mobile device. If you’re thinking that I must be a handsome computer hacking genius, deciphering code in an exciting visual way like Hugh Jackman in Swordfish, well…
All you’d be right about is “handsome.” 😉
Hacking the mobile apps of the most well known banks in the world is easy thanks to the fact that:
- The average online banking app is not particularly well made from a security perspective.
- Many online tutorials exist to direct even the most novice of internet hackers, with free software available.
- You think that you’re safe in your online banking app, and act accordingly.
Out of all of these your ignorance is the worst offender, followed by how poorly most of these banking apps are made.Read More »Are Online Banking Apps Secure? Think Again…
Get to Know
VPN Encryption Protocols – Pros and Cons
I’m going to do this in point form bullet notes of pros and cons at first. If you want to learn more, simply scroll down to the conclusion for my summary. Read More »Get to Know VPN Encryption Protocols – Pros and Cons
Stay tuned until the end of this article to check out one of my favorite TV shows that a
There are a number of countries which look to restrict the ability of their citizens to communicate, and censor the Internet. Is Skype blocked in your country? You must live in, or be vacationing in, any one of these countries which have blocked Skype in the past, or who are blocking Skype right now:
Read More »Is Your Skype Blocked: How it’s Done, and How to Get Past Skype Blocking
Using VPNs is an effective way to protect yourself from intrusion when browsing online, but they are not foolproof. A disruption in their operation can leave your connection and browsing activities exposed. This is where… Read More »What is an Internet/VPN Kill Switch?
Protecting yourself, and your valuable online data, is an essential in this increasingly hazardous online world. In this article I will look at 5 online security tools that you can use to protect yourself.