Threat Modeling: How Can We Use It for Our Cybersecurity?

Threat modeling is a set of principles, ideas, and tools used by software developers to imagine how their cybersecurity system should look like. Thankfully, as users, we don’t need to spend a semester on MIT to learn the exact coding techniques that come with it but can rather focus on the part that we can

Read More...

How is Blockchain Affecting Cyber Security

Blockchain technology is revolutionary and will bring meaningful differences in how people do business. How is blockchain affecting security? In order to stay away from rugged definitions and cumbersome visualization, let us, for starters, try to imagine Lego blocks in a digital world. Every time a transaction is made, in a digital sense of the

Read More...

Why Use a VPN Hotspot App? Top 10 Facts about Home & Public WiFi Security

Top 10 Must-Know Facts about Home and Public WiFi Security It is very comfortable setting up in your favorite café, ordering a nice hot cup of goodness and starting your work. As more and more people are working remotely, this has become quite a regular site in most urban environments. Not everything is good though,

Read More...

Why did Google+ Shut Down and How to Protect Yourself from the Consequences?

Even the biggest tech giants are prone to mistakes. While it was far from being the most popular social media platform, Google+ shut down will impact more than 352 million users who have used the service because it was tied with other Google products. Additionally, Alphabet Inc. announced that more than 52 million G+ users

Read More...

How does a VPN work? Why setting up a VPN is a good idea?

How does a VPN work? When Eric Arthur Blair, also known as George Orwell, wrote Nineteen Eighty-Four after the Second World War, he probably couldn’t even imagine the level of sophistication the future surveillance society will have and don’t get us wrong; we do live in a surveillance society. While today we are not at

Read More...

End to End Encryption on SMS and Messaging Platforms: Why it Matters

While the end to end encryption, or E2EE, is one of the simplest encrypting tools around, it is also the only reliable technique to protect your data from anyone luring between you and the person you are sending a message to. Regretfully, only a handful of SMS and messaging platforms use this option, and most

Read More...

Top 10 Best Netflix Hacks that will Change Your Life

While not being a television in the strictest sense of the word, Netflix has revolutionized the way we use our TV. No ads, no commercials, and the ability to binge-watch your favorite shows from start to finish in only one sleepless night, there is no person alive who doesn’t enjoy a little Netflix, with or

Read More...

Face Recognition: How does it impact our privacy?

Although we can all agree that the title of this technology and its application forces us to immediately assume surveillance and police work, we have to at least start wondering about its use and whether in part, or as a whole concept, it invades our rights and privacy. To start with, at the very baseline

Read More...