This post briefly explains what WebRTC is and why you should be aware of the WebRTC leak. Also, it presents how to fix the…
Privacy Issues
Hide IP and Privacy Issues
Heartbleed Vulnerability – Should I Change the Password to My VPN Account?
You have probably heard about the recently discovered vulnerability (referred to as the Heartbleed bug) within the OpenSSL cryptographic software library, a worldwide standard…
Let’s Play the Game of “Tracking Where We’ve Been” With Our iPhone or iPad
Frankly speaking, I don’t know if you’ll consider what I’m going to suggest you do as playing or as raising a red flag. Anyway,…
What If Someone Had Access To Your Computer?
I’m sure you’ve been through it: you see a computer sitting there without any screen lock, the desktop (or even some documents) open. Even…
Fighting Spam: Disposable E-mail Addresses to the Rescue
Subscriptions are everywhere nowadays whenever you go to some random internet sites: whether it is for subscribing to newsletters and offer, opening an account…
Using URL Shortening Sites to Bypass Filters
Sites like Tinyurl.com and Bitly.com are the new go-to places for Tweeters who do not want long URLs to eat up their limited typing…
TOR: An Anonymizer For Online Activists, and More
Are you an online activist? Or you don’t want to be tracked when doing your things on the internet. Let’s consider one publicly available…
Top 10 Internet Access, Security, Privacy Threats for 2010
EFF (The Electronic Frontier Foundation) compiled a list of the important trends in law, technology and business that would play an important role in…
How to Truly Browse Without Leaving a Trace
Most of the modern browsers (Chrome, Firefox, Opera) expose a so-called private mode that enables you browsing the web without leaving any traces of data on your…
New ACTA + HADOPI for All EU?
It looks like a combination of ACTA and HADOPI is coming soon to EU. If you have not heard about them don’t be surprised. There is no social consultation…
Test Your Browser For Security Gaps
When browsing anonymously, hiding your IP address is not the only issue to be taken care of. Your browser is a pathway through which malware can…
Why Connecting From Home is the Most “Dangerous” Way for Protecting Your Online Privacy?
We’re always talking about protecting our privacy in this blog, and most of the time we invite people to adopt VPN solutions like HideMyAss,…
Why can’t the collective intelligence the Web has to be used for debunking malware?
Let me phrase it from the beginning: this article can be categorized into a special topic called “the genius (or foolish) idea that can…
Are we moving towards a closed-wall Internet?
I once reported on this blog how Sergei Brin, from Google, is warning us against the new face of the internet: in this previous…
Why you need to be careful about check-in services
Due to the rise of social media, and especially the check-in features, we now have a lot of news reporting strange and funny stories…