Articles

Top Websites Use Device Fingerprinting to Track Users

Several top websites track users without their knowledge or consent using a technique called “device fingerprinting”. Device fingerprinting or browser fingerprinting is a method of collecting properties of PCs, smartphones and tablets to track and identify users. These properties include screen size, versions of installed software, and lists of fonts. The combinations of these fingerprint […]

Internet Archive to Implement HTTPS Encryption

Recently I was browsing through the Amazon website to buy a book online. Suddenly I noticed that there is an option at the bottom of the page that allows you to share what book you purchased, on social media sites like Facebook, Twitter etc. The simple act of buying a book gets publicized automatically. Besides […]

Does Apple’s iCloud Keychain Really Improve Security?

Apple has introduced iCloud Keychain feature in iOS 7 and OS X Mavericks to help iPhone, iPad and Mac users better manage their passwords with minimal inconvenience. Apple’s new iCloud Keychain claims that it can sync passwords across devices without storing them in the cloud. With features like random password generator, auto fill and iCloud […]

Tech companies call for more restraints on NSA surveillance

NSA surveillance revelations have raised questions on the reputation of high profile technology companies in recent days. Leading Tech companies like Yahoo, Google, Apple and Facebook have teamed up against the U.S government’s surveillance programs to restore their reputation and win the trust of their customers. After months of requesting the government to be more […]

NSA’s Influence on NIST Encryption Standards

The PRISM revelations indicate that the NSA has been eavesdropping on Internet communications by cracking and installing backdoors into the majority of cryptographic systems on the web. The classified documents released by Edward Snowden also indicate that the NSA works with the National Institute of Standard and Technology (NIST) to weaken international encryption standards, in […]

Security Concerns with Healthcare.gov Website

Healthcare.gov website has been encountering some technical difficulties lately. After the launch of the website, many visitors who paid a visit to the website were extremely disappointed with the site’s slow and sluggish operation. Some people were greeted with a blank screen, some spoke to misleading call center representatives or received error messages and some […]

Silent Circle and Lavabit’s “DarkMail Alliance”

In the age of PRISM revelations, finding a truly secure email service can be a challenge. The recent news about government surveillance often makes us worried about the privacy of our personal information on the Internet. The NSA leaks have made us aware that almost all of us store our email with a third party […]

SpiderOak Tips To Securely Manage All Your Passwords

Many of us log on to so many online applications everyday to check our emails, manage bank accounts, play games and socialize. However, using so many services means accumulating usernames and passwords for all the services that we try. We tend to use the same log-in information for all the services that we use. In […]

Adobe Breach Worse than Previously Disclosed

  Early in October, Adobe had suffered a massive data breach. The data breach exposed the personal information of millions of customers and the source code of famous Adobe products like Adobe Acrobat, Cold Fusion, and others. The attackers managed to access customer names, IDs, encrypted credit card and debit card numbers, expiry dates and […]

NSA Hacks into Google and Yahoo Data Center Links

After the famous PRISM program, another mass data-collection program by the NSA called “MUSCULAR” has recently come to light. The NSA jointly operates this project of exploiting data links with its British counterpart Government Communications Headquarters. Both spy agencies successfully penetrated the main connection links that connect Google and Yahoo data centers around the world. […]