2017 LiquidVPN Online Privacy Guide

How To Protect Your Online Privacy 2017 – Desktop Web Browsers

Nick Congleton Informative Internet Guides

Think about how you use your computer. Most of the time, you have your web browser open, right? Web browsers are among the most commonly used applications across all devices. So, choosing the right one one is important. Browsers go deep. Desktop web browsers are than they appear to be. Browsers are massive programs written by huge teams of developers. In a way, they’re like a second operating system running on your computer. Web browsers need to be able to read and execute code. It’s a critical part of …

2017 LiquidVPN Online Privacy Guide

How To Protect Your Online Privacy in 2017 – Introduction

Nick Congleton Informative Internet Guides

I think everyone will agree with me when I say: 2017 has been a ROUGH time for the Internet. On privacy is under attack from politicians, corporations, and criminals.  Cyber security threats are on the rise. Governments and large corporations are launching a full-scale assault on individual rights and privacy. The Internet we know and feels like it’s dead. Or is it? Thankfully, there are some simple steps you can take to protect your on privacy. This guide is here to help teach you how to fight for the Internet …

SSHowDowN Flaw Found In Internet of Things Devices

Andrew Orr In the News

Content ivery network Akamai found a security flaw, SSHowDowN, affecting over two million devices. The company says multiple clients have become targets. Further Reading New Router Hack Discovered That Targets Port 7547 Don’t Lo, But Your Wi-Fi Router Is Spying On You SSHowDowN Flaw Akamai found a way [PDF] in which hackers can exploit a particular weakness in OpenSSH (CVE-2004-1653). Millions of internet-connected devices use crypto. An attacker can use these flaws to take over these devices. Then combine their power into a single attack, like a botnet. This particular hack has a …

All I Wanted For Christmas Is Camera Encryption

Andrew Orr In the News

The Freedom of Press Foundation, along with 150 documentary filmmakers, ask manufacturers to add camera encryption to their mos. Further Reading Judge Wants ISPs To Block Torrenting Websites Canada Is Trying to Demonize Encryption Background Wired provides some background to this story. In 2013, as filmmaker Laura Poitras worked with Edward Snowden for her movie, she made sure to secure everything. Every so often, she transferred footage to encrypted hard drives, and even destroyed the SD cards after using them. But she realized that at any moment, security agents could …

The NSA’s Guide To Securing Your Mac

Andrew Orr Informative Internet Guides

The National Security Agency employs some of the best hackers in the United States. Surely they are experts at securing devices? Here’s how to lock down your Mac like an NSA pro. Further Reading NSA Contractor Faces Espionage Charges For Data Theft 5 Best Security Tools to Secure Your Data Mac Lockdown In 2010, the NSA published a guide for hardening a Mac running Snow Leopard. However, the agency hasn’t updated its guide for current versions of MacOS. Macworld posted an excellent guide that should cover modern versions of Apple’s OS. …

New Android Malware Called Dirty Cow Can Root Phones

Andrew Orr In the News

Security researchers found a new Linux escalation bug in Linux and Android. This bug, called Dirty Cow can root your Android phone without you being aware of it. Further Reading The Queen Wants 9 to 12 Year Olds to Quit Watching Porn How To Boost Your Privacy On Android Rooting Rooting is a process where a person attains a state of special control or root access to their Android phone. It gives you administrative-like control and lets you do things on your phone that you otherwise couldn’t do. You can …

How To Stay Safe Browsing From Public Wi-Fi Networks

Andrew Orr Informative Internet Guides

Earlier this week we told you about a public Wi-Fi threat called Evil Twin Hotspots. Even if you do not encounter these, using insecure public Wi-Fi is risky. Here’s how to stay safe. Further Reading Use A VPN To Defeat Evil Twin Hotspots Public Wi-Fi Hotspots More of a Threat Than You Think Insecurity You might be surprised at all of the wicked things that hackers can do to someone connected on an insecure Wi-Fi connection. There are three general ways in which an attacker can exploit public Wi-Fi: Man-in-the-middle …

Phishing: What It Is And How To Avoid It

Andrew Orr Informative Internet Guides

Phishing is a common technique that hackers use to steal your personal information. But how can you defend against it? Further Reading Use A VPN To Defeat Evil Twin Hotspots Are You Infected with Malware? Here’s How To Find Out What Is Phishing? Essentially, phishing is when a hacker tries to steal your personal information, like passwords, credit card numbers, etc., by pretending to be someone else. They can pretend to be a friend or family member, or even a website. The most common way for a hacker to do …

9 Ways to Boost Your Wi-Fi Signal

Andrew Orr Informative Internet Guides

Speed is the game these days. As apps and features like artificial intelligence become increasingly powerful, it’s important to have a strong Wi-Fi signal. Further Reading Don’t Lo, But Your Wi-Fi Router Is Spying On You How To Fix Windows 10 Privacy Issues 1. Update Your Router’s Firmware The first step to boosting your Wi-Fi signal is to upgrade the router’s firmware. Firmware is a little different than regular software. As defined by Wikipedia, firmware “is a type of software that provides control, monitoring and data manipulation of engineered products …

Are You Infected with Malware? Here’s How To Find Out

Andrew Orr Informative Internet Guides

Is your computer acting strangely? Are you seeing popup ads, even when you’re not in a browser? You just might have malware. Here’s how to find out and remove it. Further Reading How to Spot Hidden Malware and Download Safely How To Fix Windows 10 Privacy Issues Warning Signs Whether you clicked on a link in a spam e, visited a suspicious website, or even used a random USB drive you found on the ground, there are many ways to get a virus. A computer virus is just one type …