http://www.pcmag.com/article2/0,2817,2425215,00.asp#
CyberTechTips
Around the Corner-MGuhlin.org: Open Source Encryption Tools to Protect #Pri
I was totally unprepared for today’s bombshell revelations describing the NSA’s efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be…
Google has been secretly harvesting the passwords of all Wi-Fi devices ever
Employees keep using personal cloud services to store work documents
Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade
‘Innate need for privacy’: Rick Falkvinge talks freedom and surveillance
The difference between privacy and anonymity, Internet freedom and NSA surveillance, and the future of the web - at RT’s Google Hangout, Rick Falkvinge answers the most pressing questions that concern all Internet users in their everyday lives.
How to Encrypt the Data on Your Android Phone or iPhone
Obama’s Flip-Flop on Spying
By Jacob Sullum - President Obama claims he welcomes the public debate over government surveillance programs that track personal information about millions of innocent Americans. But if it were up to him, the debate never would have happened, since the programs would have remained secret. Furthermore, his administration is treating the whistleblower who made the debate possible as...
How your identity gets swiped even if you're careful
Schneier on Security: Senator Feinstein Admits the NSA Taps the Internet Ba
We know from the Snowden documents (and other sources) that the NSA taps the Internet backbone through secret agreements with major US telcos., but the US government still hasn’t admitted it. In late August, the Obama administration declassified a ruling from the Foreign Intelligence Surveillance Court. Footnote 3 reads: The term ‘upstream collection’ refers to NSA’s interception of Internet communications as they transit [LONG REDACTED CLAUSE], [REDACTED], rather than to acquisitions directly from Internet service providers such as [LIST OF REDACTED THINGS, PRESUMABLY THE PRISM DOWNSTREAM COMPANIES]...
Anonymous Browsing: Comparing Tor, JonDo, VPN and web proxies
NSA employee spied on nine women without detection, internal file shows
Twelve cases of unauthorised surveillance documented in letter from NSA's inspector general to senator Chuck Grassley
The NSA Refuses To Deny That It Collected The Location Data Of US Phone Cal
Ask Slashdot: Has Gmail's SSL Certificate Changed, How Would We Know?
No Upper Bound On Phone Record Collection, Says NSA
Quickly Encrypt Files and Send Them to Dropbox from the Send To Menu
http://lifehacker.com/theres-one-arena-where-the-fingerprint-scanner-is-absol-1386381030
Bruce Schneier Discusses the NSA Documents
Close the NSA’s back doors
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
Tomgram: Calabrese and Harwood, Privacy Down the Drain
For at least the last six years, government agents have been exploiting an AT&T database filled with the records of billions of American phone calls from as far back as 1987. The rationale
Alien-Level Tech Required To Crack New VPN Encryption Setup, Makers Say
In the wake of the Edward Snowden NSA revelations the use of encryption has become an extremely hot topic. Demand for anonymity tools has increased rapidly and providers are offering better services to satisfy that demand. Today we bring news of a new VPN client from Private Internet Access, one containing features that if regularly configured correctly would require "advanced alien technology" to crack.
Buying or Selling a Used iPhone or iPad Running iOS 7? Read This First!
It's no secret that iOS is a secure operating system, but Apple's latest firmware update adds yet another level of protection for consumers.
How To Make Your Entire Internet Life More Secure In One Day
Yahoo! Calendar has a nifty little reminder feature that will send a message to your phone, instant messenger or email address a given time period before an event.Thanks to Catholic school, I can still conjugate certain Latin verbs by heart. But remembering my brother's birthday? Always a challenge.
Can Apple Read Your iMessages? Yes! iOS Hacker @Pod2g Reveals The Truth Abo
Be Very Afraid
What we should have known about government spying before Edward Snowden's leak, why even innocent people have plenty to fear, and what you can do about it
Mobile data security remains weak
Coalfire surveyed 400 individuals working in a variety of industries across North America who are not affiliated with their company's IT department.
Four privacy settings you should enable in iOS 7 immediately | ZDNet
If you downloaded and installed iOS 7, there are a few privacy settings that are turned off by default that you should enable right away.
Qi4BOX™: Dropbox™ just became very secure
A sleek, elegant and powerful device that secures all your Dropbox files.
Web Filtering in iOS 7
OpenPGP Studio Keeps Prying Eyes Off Your Personal Data