top of page
Search
Aug 22, 20193 min read
Social Engineering - Playing with Mind Games
Have you ever gotten scammed? If not, even if you think you're too smart to fall for a scam, you may have fallen into the hands of such...
Aug 15, 20193 min read
How to Recognize and Avoid Email Phishing
We've all seen the suspicious email where it has enough information to seem legitimate but we're only half sure if they're real or not....
Aug 8, 20193 min read
How Should You Handle a Data Leak?
Recently, data breaches seem to be the fuss in major headlines. There was the Capital One breach a few weeks back, NASA getting hacked by...
Aug 1, 20192 min read
All You Need to Know About the Capital One User Breach
The Capital One incident, which has resulted in about 106 million people in the U.S. and Canada waking up to the realization that their...
Jul 25, 20192 min read
NASA was Hacked by a $25 Computer
The National Aeronautics and Space Administration (NASA), responsible for cutting-edge technology in science and space, recently had 500...
Jul 18, 20194 min read
Hotspot VPN's Guide to Encrypting Your Online Data
To this modern day, cryptography is everywhere. And it's easier to use and more widespread than ever before. In fact, secure...
Jul 11, 20192 min read
Why You Need To Use Two-factor Authentication
It's everywhere: your email provider, your bank, your work account––they all have prompted you more times than enough to turn on...
Jul 4, 20193 min read
What does Google have on us?
Most of us use Google on a daily basis without thinking too much into it. We are inclined to think that since everyone uses it so much,...
Jun 27, 20192 min read
The Morality in Cybersecurity
What are the current moral issues with internet security? Many grey areas within this broad range of scope are difficult to clearly...
Jun 20, 20192 min read
Incognito Mode: A Placebo to Private Browsing
Today, a web browser's Incognito Mode is used almost religiously and users do not think twice about the risks involved and place...
Jun 13, 20192 min read
Your Phone Location Data Are Still Being Sold By Phone Carriers
In 2018, AT&T, Sprint, T-Mobile and Verizon were guilty of selling their users' location data. They then were pressured by both the US...
Jun 6, 20192 min read
The Risks of Using Public WiFi
Many of us do not have the luxury of having portable WiFi devices, especially in many cases when it is a big hassle to carry around. Many...
May 30, 20191 min read
How to Delete Default Apps From Your Device
If you ever find yourself in the situation of not needing Apple's native applications anymore, here is a quick tutorial on how to delete...
May 23, 20192 min read
How to Check if Your VPN is Working
VPNs are a very simple way to improve your online security, but how do you check if the VPN you're using is actually working? Here are...
May 9, 20192 min read
History of VPNs
The VPN, or virtual private network, dates back to 1996 when Microsoft employee, Singh-Pall, created a method and tool to allow users a...
May 2, 20192 min read
The Future of the VPN Market
Over the past 10 years, the VPN market has grown exponentially as consumers and businesses alike seek new innovative ways to protect...
Apr 25, 20192 min read
Understanding VPN Consumer Reports
We’ve talked so much about why we need to use a VPN but here’s some data to show that really, we’re not kidding. People really do use...
Apr 18, 20192 min read
China Begins to Crack Down to VPN Usage
For many years, China’s “great firewall” has greatly restricted internet usage and access to many western websites. As the Chinese...
Apr 11, 20193 min read
5 Best Alternatives to Youtube
By using Youtube, you are giving Google even more data than it already has. The following video site alternatives might serve you ads but...
Apr 4, 20192 min read
Free vs. Paid VPNs
A virtual private network (VPN) is the best way to access the internet with complete anonymity. If you are looking for complete access to...
bottom of page