-
What is a Bitcoin node and who needs one?
The Bitcoin network does not have a central authority that decides which transactions are valid and which are not. There is nobody who issues coins, and nobody who can take them back. Nobody knows how...
-
11 massive government data breaches
We’re constantly hearing about data breaches lately—and it’s no wonder, given that billions of personal records are exposed every year. While the majority of cybersecurity headlines center ar...
-
9 things you can do with a home server
Running your own server at home can be cheap and requires only basic knowledge of the command line. An old laptop can be converted into a server without any physical modifications, and even a modest d...
-
Why should I use two-factor authentication?
You might have skipped over your email provider’s prompt: Turn on two-factor authentication. Two-factor authentication, or 2FA, is a secondary security measure for logging into an online account, wh...
-
6 ways to protect your online finances... In the physical world
From VPNs to antivirus software, there is no shortage of precautions to take when protecting your personal banking online. But your financial information can be just as vulnerable to theft in the phys...
-
Why you shouldn’t ignore ‘Update Your Device’ messages
It’s pretty much second nature at this point. We start our laptops and hunker down in our seats, ready to power through the day with a steaming cup of coffee. As we browse through our daily calendar...
-
ExpressVPN survey reveals Americans do care about privacy after all
NOTE: This post was originally published on June 13, 2019 A representative survey, commissioned by ExpressVPN and undertaken by Propeller Insights, produced many surprising results while confirming so...
-
6 common misconceptions about passwords
We all need passwords. They are by far the most used form of authentication, not only for accessing accounts over the internet, but also for phone banking, ATM use, opening a safe, and even to take bo...
-
What are botnets, and how do you protect against them?
Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can, for example, be used to mine cry...
-
Could Facebook’s messenger merger signal dark days for WhatsApp users?
NOTE: This post was originally published on January 31, 2019 Facebook founder Mark Zuckerberg recently announced plans to merge his three dominant messaging services: Instagram, Facebook Messenger, an...
Tips & tricks
