VPN (Virtual Private Network) is an essential tool for better online security. Remote workers, travelers, and everyone who wants to be safer on the internet can protect their sensitive data and to a certain degree also prevent leaking of private information Read >
Category: Security
Top 10 most exploited software security holes hide in office documents
People who work with open source software tend to be concerned about vulnerabilities in WordPress, Java and other popular products, but criminals and spies who want direct access inside a business or government organization prefer exploiting security holes in office documents. Read >
How to install Wireguard VPN server and client on a Linux computer
Virtual Private Network (VPN) software technology was adopted years ago by enterprises for securely establishing office-to-office connections and for allowing traveling employees to access in-house applications. Since then, VPN has proved to be a useful technology for individuals who want Read >
Cybercrime ranked as top 5 risk for communities globally
In early 2020, World Economic Forum (WEF) published its annual Global Risks Report that highlights events, trends, and developments that are most likely to cause major disruptions to societies across the world. In the middle of a worldwide pandemic, the Read >
Unsurprisingly, also open source software has vulnerabilities – here are some trends
Open source software products are often regarded safer and less vulnerable to malicious hacking than propriety software. The principle of showing the actual program code to the world and allowing other people and organizations to run the software is a valid Read >
Nextcloud secure login options explained, and how to configure an easy login
Nextcloud open source software package has plenty of options for securing data it stores, and for providing secure mechanisms for accessing the cloud services it provides. If a Nextcloud server is accessible on the public internet, the first thing to do Read >
User profiling businesses operate in plain sight, but don’t obey the law
Today, everyone is aware that Facebook, Google and Twitter, among many other free digital services sell their users’ personal data to advertisers. Many savvy users are protecting their privacy with additional software plugins to prevent this automatic data collection. Behind the scenes, however, is the real Read >
Safety comparison of the electric and petrol-powered compact car
Electric vehicles are becoming mass market products in many categories during the next few years. Volkswagen is planning to manufacture millions of electric cars, pickup trucks like Rivian are powered by batteries, and European and Japanese van manufacturers have electric vans Read >
Never share this information about yourself on social media, a former con artist advises
Frank Abagnale, whose successful career as a scammer was depicted in a movie Catch Me If You Can has some solid advice for all of us who like to share information about our lives on social media. The first point Abagnale Read >
Criminals have discovered a way to skim credit card data from online stores
The annual hyperactive shopping season starts from Black Friday in late November and will continue to early January. News of hacked online stores that leak customers’ credit card and personal data to criminals are not welcomed by e-commerce merchants just now. Read >