New Approach to GDPR: Using Machine Learning to Enhance Privacy

The General Data Protection Regulation (GDPR) will come into effect on the 25th of May. Although this particular law applies to the European Union, it does not only concern businesses registered there: every entity that has EU clients will have to comply with it. GDPR has no precedent. However, it could become the worldwide gold standard of privacy laws. In …

New DNS Encryption Tools Accelerate Privacy Online

Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as strictly privacy-oriented service. According to CUJO AI data, it has acquired nearly 4% of the total DNS market since its launch on April 1st and now stands as the fifth most popular DNS provider. Moreover, Google and …

Don’t get burnt by the Firefox

Beware: Critical Vulnerability Discovered in Mozilla Firefox Browser

What happened? On 29th of January Mozilla developer, Johann Hofmann reported that unsanitized output in the browser UI could lead to arbitrary code execution. On January 30th, Mozilla has released a security update to address a vulnerability (CVE-2018-5124) in Firefox. Exploitation of this vulnerability may allow an attacker to take control of an affected system. Read an article about the …

Why You Shouldn’t Trust Two Factor Authentication?

On June 26th Wired shared: Since two-factor authentication became the norm for web services that care about securing your accounts, it’s started to feel like a security blanket, an extra layer keeping your data safe no matter whether your password is as strong as 8$&]$@I)9[P&4^s or as dumb as dadada. Two-factor authentication (2FA) works by generating a temporary code, which …

Benefits of Connected Home Devices and Security Systems

Young people today do not know just how good they have when it comes to all the technological wonders available in the world. For those of an older generation, it can often feel as though we are living in a world of The Jetsons or Star Trek.  Almost everyone is online through their computers, tablets, smartphones, or a plethora of …

The Top 10 Internet Security Tips You Must Follow

Connecting an unprotected computer to the Internet is an invitation for hundreds, perhaps thousands, of different viruses. It’s also a green light for any would-be hacker interested in stealing your personal information and compromising your privacy. Think that your information isn’t of value to them? Think again – personal information theft is at an all-time high these days. Even having …