Privacy & Protection

8 Best Portable Antivirus Tools to Keep on Your USB for On-the-Go Protection

When it comes to Android devices, the need for...

The Risks of Oversharing on the Internet: How Spear Phishing Puts You in Danger

Social media is part of nearly everyone’s life, it’s...

13 Best Open-Source Encrypted Messaging Android Apps For Privacy Concerned People

Nowadays almost every famous chat apps available for Android...

10 Alternatives to Android and iOS You Should Know

The duopoly of Android and iOS dominates the world...

10 Best Free Antivirus Apps For Android in 2024

So, you've got an Android phone, huh? That's cool,...

Google will auto-delete data it gets from new users

Google is known for collecting user's data — via browsing history on Chrome, viewing history on YouTube, or location history on Maps.  Today Google knows...

Firefox Private Network VPN exits Beta phase and launching as Mozilla VPN

Mozilla announces a new dedicated VPN service — Mozilla VPN — renaming Firefox Private Network VPN. Mozilla was working on a dedicated VPN service —...

Mycroft — world’s first open-source voice assistant puts privacy at the forefront

When it comes to voice assistants, the services that pop up in our minds are from top tech giants like — Apple's Siri, Amazon...

Google faces $5 billion lawsuit for tracking users in Incognito mode

The search giant Google faces a class-action lawsuit that accuses of invading people's privacy and tracking their internet use even when browsers are set...

Introduction to Two Factor Authentication and Different Types of 2FA

Activating Two Factor Authentication or 2FA has now become a major security deal to secure our online services. Nowadays almost every website — that...

Why Encryption Is The Most Overlooked Cybersecurity Practice

In the world of cybersecurity, encryption doesn't seem to be getting the love/attention it deserves. When mentioning an antivirus or password manager, in comparison,...

[Infographic] Best cybersecurity practices to prevent data breach in your organisation

We are not in secure cyber work, data breaches are becoming more common, and can be a huge cost burden for a company of...

A comprehensive guide on double VPNs and whether you really need one

Internet privacy has almost become a trend, and those working in the tech sector live by the security and privacy that is offered by...

Purism Librem 5 — 100% open GNU/Linux smartphone starts shipping

Purism finally starts to ship Librem 5 smartphones — the phone that focuses on security by design and privacy protection — to early backers...

Don’t get scammed: Think twice before making calls with Siri or Google or Alexa

Next time, be alarmed before making calls to a business with Siri or Google or Alexa — because there is a high chance to...

‘Oversharing on social media’ is one of the major security mistake people make online

It is typical of us sharing some details of our personal life too much on social media — like mother's maiden name or pet's...

[Infographic] Enemies of Internet Freedom – Government Organizations Around the World who Monitor our Online Activities

Today we are talking about internet freedom. The Internet is the vast ocean, the World Wide Web is home to over a trillion gigabytes of...