The FBI does have access to many messengers

It can be hard to know who to trust these days, even for your government. There are a lot of programs available now that allow you to communicate privately, with the promise that they will keep your messages safe. However, it’s not always possible to tell if these companies are trustworthy or if they’re providing an adequate level of security. In this article, you’ll find out how the FBI has …

Learn more →

A critical vulnerability in the most widely used server software

A critical vulnerability has been found in the most widely used server software that could allow malware to be introduced to many servers available on the Internet. This type of attack is known as remote code execution, and it has already been used in attacks against WordPress installations, for example. The case A vulnerability has been found in the popular Apache server software that could allow malware to be introduced …

Learn more →

Use cloud encryption so no one else can read your files

It has never been a better time to take advantage of the cloud. There are so many benefits to going paperless, from accessing your data anywhere to being environmentally friendly. But before you start saving all your important documents and files up in the cloud, you need to know how to keep them as private as possible. In this article, find out what E2E encryption is and why it’s essential …

Learn more →

The best U2F apps for iOS, Android, and Windows Phone

Biometrics and embedded security are becoming more and more widespread in the world of IT and software. Apple, Google, and Microsoft have all integrated biometric technologies into their devices. But what do you do if you don’t own one of these devices? Or if you travel a lot and want to use your U2F app on different computers? What is U2F? The U2F app will enable you to log in …

Learn more →