Privacy & Protection
8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection
When it comes to Android devices, the need for...
The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger
Social media is part of nearly everyone’s life, it’s...
13 Best Open-Source Encrypted Messaging Android Apps For Privacy Concerned People
Nowadays almost every famous chat apps available for Android...
10 Alternatives to Android and iOS You Should Know
Vishak -
The duopoly of Android and iOS dominates the world...
10 Best Free Antivirus Apps For Android in 2024
So, you've got an Android phone, huh? That's cool,...
Google will auto-delete data it gets from new users
Google is known for collecting user's data — via browsing history on Chrome, viewing history on YouTube, or location history on Maps. Today Google knows...
Firefox Private Network VPN exits Beta phase and launching as Mozilla VPN
Mozilla announces a new dedicated VPN service — Mozilla VPN — renaming Firefox Private Network VPN. Mozilla was working on a dedicated VPN service —...
Mycroft — world’s first open-source voice assistant puts privacy at the forefront
When it comes to voice assistants, the services that pop up in our minds are from top tech giants like — Apple's Siri, Amazon...
Google faces $5 billion lawsuit for tracking users in Incognito mode
The search giant Google faces a class-action lawsuit that accuses of invading people's privacy and tracking their internet use even when browsers are set...
Introduction to Two Factor Authentication and Different Types of 2FA
Activating Two Factor Authentication or 2FA has now become a major security deal to secure our online services. Nowadays almost every website — that...
Why Encryption Is The Most Overlooked Cybersecurity Practice
Vishak -
In the world of cybersecurity, encryption doesn't seem to be getting the love/attention it deserves. When mentioning an antivirus or password manager, in comparison,...
[Infographic] Best cybersecurity practices to prevent data breach in your organisation
We are not in secure cyber work, data breaches are becoming more common, and can be a huge cost burden for a company of...
A comprehensive guide on double VPNs and whether you really need one
Internet privacy has almost become a trend, and those working in the tech sector live by the security and privacy that is offered by...
Purism Librem 5 — 100% open GNU/Linux smartphone starts shipping
Purism finally starts to ship Librem 5 smartphones — the phone that focuses on security by design and privacy protection — to early backers...
Don’t get scammed: Think twice before making calls with Siri or Google or Alexa
Next time, be alarmed before making calls to a business with Siri or Google or Alexa — because there is a high chance to...
‘Oversharing on social media’ is one of the major security mistake people make online
It is typical of us sharing some details of our personal life too much on social media — like mother's maiden name or pet's...
[Infographic] Enemies of Internet Freedom – Government Organizations Around the World who Monitor our Online Activities
Today we are talking about internet freedom. The Internet is the vast ocean, the World Wide Web is home to over a trillion gigabytes of...