a-e8a5874f-0001-0001-0000-000000941262
CyberTechTips
30c3: To Protect And Infect, Part 2 - YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
NSA reportedly plants spy malware on laptops purchased online | Muktware
Criminals Use Social Media Too
Anti-Snooping Apps For When Everybody's Watching You
edit Future of Work Sustainable Innovation: Redefining Profit Through Circular Economies Our current way of doing things, where we take resources, make stuff, and then just throw it away, is causing big problems. We’re running out of resources, and the environment… By Jeff Baumgart June 23, 2025 edit Future of Work How Smart Cities Are […]
2013 Blew Apart Our Notions Of Privacy
Penetration Testing with Kali Linux – Online Course Update
Target Hacked, Credit Cards and Private Data for 40 Million Stolen
Earlier this week, word came out that Target was the victim of a massive hack that exposed the credit card numbers and other personal, private data
Important Notice: unauthorized access to payment card data in U.S. stores
Target says 40 million accounts hit by security breach | Toronto Star
No Canadian stores affected, company says.
Protecting Student Privacy In The Data Age
Is Student Data Safe?
800,000 in danger of ID theft after laptop theft
Dallas Morning News
Telegram Desktop
Experience Telegram on your computer in a swift and seamless way.
Encryption is coming FAST… so don’t wait
World's leading authors: state surveillance of personal data is theft
500 signatories including Günter Grass, Margaret Atwood and Martin Amis demand 'digital bill of rights' to curb state abuses
encrypted messages for Android
How To Encrypt Your Android Smartphone or Tablet
Encrypting an Android device is a good idea if there's sensitive data stored on it locally. Encrypting it is easy, but there's a few things to keep in mind.
Almost 2 million Facebook, Google, Twitter and Yahoo accounts compromised i
Encryption ethics: are email providers responsible for privacy?
Ex-National Security Agency (NSA) employee Edward Snowden’s various leaks – the most recent being a slide showing that the NSA infected 50,000 of computer networks with remote-controlled spyware – confirm…
The Government’s Secret Plan to Shut Off Cellphones and the Internet, Explained
Everything you need to know about the 'Internet kill-switch.'
Death and the NSA: Motherboard Meets Bruce Schneier
KYAnonymous asked about encryption.. and fails.
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
The unofficial guide to Facebook privacy
Email encryption app Secutor is now free for all
Operating System that supports Privacy and Anonymity
Secure Emails | Webmail | Tutanota Free
Tuta guarantees your data stays private for free & without ads. Quantum-resistant encryption makes Tuta the best secure technology solution to protect your privacy.
Aldous Huxley: the prophet of our brave new digital dystopia | John Naughton
John Naughton: CS Lewis may be getting a plaque. But Huxley, for his foretelling of a society that loves servitude, is the true visionary
Public vs. Private – Should Student Work Be Public On the Web?
10+ years ago, filters and blocking tools were banning access to most blogs and web publishing services in schools around the world. In fact, this is exactly why The Edublog Awards were started – to showcase the excellent work being done with blogging in schools – hoping it would begin to break down these barriers...
Using TrueCrypt on Linux and Windows
Update 2: TrueCrypt audit results released (PDF) Update: the TrueCrypt project unexpectedly shut down on 28 May 2014. A mirrored copy of TrueCrypt.org is available on Andryou.com. The home page of …