Posts

Showing posts from October, 2018

Signal Encrypted Messaging App Removing Sender ID from Metadata

Signal and other encrypted messaging services have always kept the contents of messages sent on their platforms hidden in encrypted form. However until recently, information about who is sending and receiving messages was still accessible to third parties, including government agencies. On October 29, Read More The post Signal Encrypted Messaging App Removing Sender ID from Metadata appeared first on Search Encrypt Blog .

Companies Making A Difference in Online Privacy and Security

Privacy and security can be achieved in a number of ways. That’s why there are so many companies out there making a difference. Each company takes a unique approach in protecting people’s information online. Cryptocat Cryptocat is an open source privacy-enhanced messaging platform. It uses Read More The post Companies Making A Difference in Online Privacy and Security appeared first on Search Encrypt Blog .

Search Encrypt Explains How to Delete Your Google History

If you use Google as your main search engine, Google collects information about you and your web behavior.. This information can then be used by advertisers and businesses— and could actually be costing you money! Visit My Activity to see exactly what information Google Read More The post Search Encrypt Explains How to Delete Your Google History appeared first on Search Encrypt Blog .

8 Ways to Protect Your Digital Privacy

Regardless of how you use the internet, it’s nearly guaranteed that you are being tracked in some way. Natalie Triedman recently shared how people, often unknowingly, are sharing their location. We aren’t saying that you should freak out and stop using the internet, but it’s a good Read More The post 8 Ways to Protect Your Digital Privacy appeared first on Search Encrypt Blog .

8 Companies Making Great Cybersecurity Hardware

The cool and new products online are all cloud-based. These are great from a convenience standpoint, because it’s so easy to access your data from anywhere. However, storing your data in the cloud means you have to trust the provider to not log or Read More The post 8 Companies Making Great Cybersecurity Hardware appeared first on Search Encrypt Blog .

16 Privacy and Cybersecurity Blogs You Should Be Reading

If you’re already interested in cybersecurity, you may have heard of some of these blogs. We searched the web for unique, high-quality blogs offering the best coverage of current privacy and cybersecurity issues. Access Now Blog Access Now defends and extends the digital rights Read More The post 16 Privacy and Cybersecurity Blogs You Should Be Reading appeared first on Search Encrypt Blog .

38 Internet Security Terms You Should Know

Internet security can be an overwhelming topic. It can feel like the only people who can understand it are computer geniuses. There are some terms that anyone who uses the internet should be aware of. We’ve put together this list to help you get Read More The post 38 Internet Security Terms You Should Know appeared first on Search Encrypt Blog .

Complete Beginner’s Guide to Internet Safety & Privacy

Privacy matters. Even if you think you have nothing to hide, it’s in your best interest to make your privacy a priority. Most people don’t discuss privacy on the internet with their friends. “More than three-quarters of adult internet users (78 percent) are concerned Read More The post Complete Beginner’s Guide to Internet Safety & Privacy appeared first on Search Encrypt Blog .

12 Rules For Safer Internet Use in 2018

Achieving any semblance of privacy when using the internet can feel like an impossible task. However, by making a few minor changes to how you use the internet you can make big progress in your online privacy journey. These 12 steps won’t guarantee your Read More The post 12 Rules For Safer Internet Use in 2018 appeared first on Search Encrypt Blog .

Search Encrypt Going Big on Privacy for National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM). The National Cyber Security Alliance and the U.S. Department of Homeland Security launched NCSAM in 2004 in an effort to give Americans the resources they need to stay safer on the internet. Popular Topics in Cybersecurity for Read More The post Search Encrypt Going Big on Privacy for National Cybersecurity Awareness Month appeared first on Search Encrypt Blog .

Twitter May Be Tracking You With Shortened Links

Michael Veale, a privacy researcher at University College London, sparked an investigation into Twitter and how it tracks users when they click on its shortened (t.co) links. When Veale requested all the information Twitter has stored about him, Twitter did not include the information Read More The post Twitter May Be Tracking You With Shortened Links appeared first on Search Encrypt Blog .

Why Companies are Making the Switch to Cloud Security

Over the past several years, we have seen massive growth in the industry of artificial intelligence. Its use in nearly every field has connected everyone and everything more than ever before. As the Internet of Things (IoT) becomes a larger part of the world Read More The post Why Companies are Making the Switch to Cloud Security appeared first on Search Encrypt Blog .

Private Email & Messaging Platforms for Confidential Communication

Using the internet with any expectation of privacy is becoming much more rare. A new privacy scandal seems to pop up as soon as the last one goes away. While it may be more difficult to keep your communication private online, there are a Read More The post Private Email & Messaging Platforms for Confidential Communication appeared first on Search Encrypt Blog .

Best Password Manager & Password Generator Tools

If your password is “passw0rd” or your last name, you’re putting your data at risk. Those types of passwords are easy to guess for anyone who has access to your computer or for hackers trying to crack into your accounts. Password managers make it Read More The post Best Password Manager & Password Generator Tools appeared first on Search Encrypt Blog .

22 VPN Services for Privacy

Our Criteria For Selecting A VPN When choosing a VPN, we think the most important factors you should consider are: Where is the VPN based? Does the VPN accept anonymous payment methods? Does the VPN support OpenVPN protocol? Does the VPN follow a no Read More The post 22 VPN Services for Privacy appeared first on Search Encrypt Blog .

11 Private Email Services To Keep Your Emails Confidential

Email plays a vital role in how we communicate online. If you’ve decided to make privacy a priority by using alternatives to mainstream products on the internet, your email is another weak link you could likely improve on. Generally private email services use encryption Read More The post 11 Private Email Services To Keep Your Emails Confidential appeared first on Search Encrypt Blog .

29 Privacy Tools and Products To Protect Your Data

Ad & Tracker Blockers We’ve combined ad and tracker blockers because their functionalities are basically the same. Generally, they work by detecting tracking or ad scripts on the pages you visit. If the blocker detects that code, it will block the script from running, Read More The post 29 Privacy Tools and Products To Protect Your Data appeared first on Search Encrypt Blog .