Posts

Showing posts from March, 2019

How To Be Invisible on Facebook

While Facebook is a way to share photos and other posts with your friends, you may want to keep your posts private from certain people. If you don’t want your co-workers, ex-boyfriends, etc. to find you on Facebook you can take these steps to make yourself “invisible”. If you’re concerned with Facebook tracking your information… The post How To Be Invisible on Facebook appeared first on Search Encrypt Blog .

How Data Scientists Can Make Privacy a Priority

Because nearly every business is using big data to power their decision making and business processes, the demand for data scientists is growing rapidly. According to GetEducated.com, “the number of data scientists doubled over the last four years, and some even quote the growth at 300%” Companies understand how valuable customer data is, and are… The post How Data Scientists Can Make Privacy a Priority appeared first on Search Encrypt Blog .

Best Firefox Privacy Add-Ons

Contents Privacy Badger uBlock Origin LessPass Cookie AutoDelete HTTPS Everywhere Decentraleyes uMatrix Search Encrypt TrackMeNot NoScript Security Suite Privacy Badger Privacy Badger is a tracker blocker that learns which trackers to block. Rather than maintaining a blacklist of “tracking” domains, Privacy Badger watches which domains follow you from site to site and blocks them once… The post Best Firefox Privacy Add-Ons appeared first on Search Encrypt Blog .

Why It’s So Hard To Switch from Google

Switching from Google can feel like an impossible task. A lot of the same reasons apply to why it’s so hard to move away from Facebook. There are network effects that keep people coming back, and it can be difficult to share files or messages with people using Google products if you aren’t using them.… The post Why It’s So Hard To Switch from Google appeared first on Search Encrypt Blog .

Facial Recognition

Government agencies around the world have started experimenting with using facial recognition technology in their surveillance and security efforts. While this surveillance may seem concerning, perhaps even more scary is that marketers are also using facial recognition data for identifying and tracking their customers. Companies spent $3.35 billion on facial recognition technology in 2016. That… The post Facial Recognition appeared first on Search Encrypt Blog .

How To Remove Google From Your Online Life

If you’re “searching” for something on the internet, there’s a good chance that you’re using Google. Google has created an ecosystem to collect people’s information, and their product line continues to expand. This expansion is just leading to more touch points with their users to collect their data. There are private alternatives to almost every… The post How To Remove Google From Your Online Life appeared first on Search Encrypt Blog .

Internet Privacy Is a Civic Responsibility

Internet privacy should be a basic human right. Unfortunately there is a lot of debate surrounding how much privacy people should have on the internet. Following the Cambridge Analytica scandal in 2018, people are aware that companies like Facebook and Google are sucking up user-data and selling it to third-parties. Right now there is a battle between… The post Internet Privacy Is a Civic Responsibility appeared first on Search Encrypt Blog .

Privacy Issues with The Internet’s Most Popular Websites

Many of the websites that millions of people visit every day collect data about their visitors. This puts both the websites and the users at risk of losing their data to some unwanted third party. Beyond a hack or data breach, how these websites use people’s data is a big concern. As we’ve seen in… The post Privacy Issues with The Internet’s Most Popular Websites appeared first on Search Encrypt Blog .

Tips to Protect Your Search Privacy

1. Don’t Put Personally Identifying Information in Your Search Terms (Easy) Searching for your name and where you live could give a malicious actor enough information to track you down. If someone is monitoring your network activity and you’re using a search engine without encryption, your search terms could be leaked. Even if you don’t… The post Tips to Protect Your Search Privacy appeared first on Search Encrypt Blog .

How Does RKill Work?

RKill is an antivirus program on Windows that terminates malware and other viruses. You should use RKill along with other antivirus software for removing viruses and malware from you device. RKill is a simple utility that will stop known malware processes from running on your device. While it will kill the malware from running, it won’t… The post How Does RKill Work? appeared first on Search Encrypt Blog .

Comparison: Whitelist vs. Blacklist

Whitelists and blacklists are ways of filtering specific types of data, or from blocking malicious or unauthorized access to systems or databases. In the context of computer security, blacklisting and whitelisting are used as a means of access control. However, there are some differences between the two methods, and each method has its own advantages.… The post Comparison: Whitelist vs. Blacklist appeared first on Search Encrypt Blog .

Twofish Encryption: What Is It?

Twofish is an encryption algorithm designed by Bruce Schneier. It’s a symmetric key block cipher with a block size of 128 bits, with keys up to 256 bits. It is related to AES (Advanced Encryption Standard) and an earlier block cipher called Blowfish. Twofish was actually a finalist to become the industry standard for encryption,… The post Twofish Encryption: What Is It? appeared first on Search Encrypt Blog .

What is Key Escrow?

Key Escrow is an arrangement in which the cryptographic keys needed to decrypt certain data are held in escrow. This essentially means that an organization trusts a third party to store a backup of the cryptographic key in case of either disaster or security breach. What is the purpose of a key escrow? Maintaining a… The post What is Key Escrow? appeared first on Search Encrypt Blog .

The Case Against VPNs

VPNs are regarded as an all-encompassing internet privacy tool. There is a major misconception that with a VPN, you can do whatever you want on the internet and be anonymous. That is not the case. Just like any other tool, VPNs require additional responsibility to make them effective. We are still big advocates for using… The post The Case Against VPNs appeared first on Search Encrypt Blog .

How Do Security Certificates Actually Work?

What is a Security Certificate? A security certificate is a tool that websites use for validation and encryption. They are part of the HTTPS protocol which secures the flow of data between your browser and the servers of the websites you visit. Certificates are issued by a trusted certificate authority. What is an SSL (Secure… The post How Do Security Certificates Actually Work? appeared first on Search Encrypt Blog .

What is Privacy Protection?

Everyone uses computers, smartphones, and other internet-connected devices. While it’s easy to feel like the information you receive from these devices only flows in one direction. If you search for something on Google or look at your friend’s profile on Facebook it feels like you’re the one getting information. BUT…Information flows just as much from you… The post What is Privacy Protection? appeared first on Search Encrypt Blog .

Why You Should Take Your Privacy Seriously

Contents: What Is Privacy? Who Is Collecting Information About You? What Exactly Are They Collecting? How Long Will Your Information Be Stored? Who Is It Shared With? Can You Opt Out? Can We Control Our Information? How Is Your Information Used Against You? Daniel Solove’s 10 Reasons Why Privacy Matters How To Stay More Private… The post Why You Should Take Your Privacy Seriously appeared first on Search Encrypt Blog .

How To Hide From Online Big Brother

Bruce Schneier on Security Risks in the Hyper-Connected Era Bruce Schneier (Link to Schneier’s Security Blog) explains how we can best use the internet to fit our needs without falling victim to its lack of security. He shares why its so difficult to find security in a world where “everything is a computer”. Most software… The post How To Hide From Online Big Brother appeared first on Search Encrypt Blog .