“In the name of â€œpreventing, detecting and investigating terrorist offenses and related travelâ€, all United Nations (UN) Member States should develop systems for processing and analysing Passenger Name Record (PNR), Advance Passenger Information (API) and â€œfingerprints, photographs, facial recognition, and Continue reading UN Security Council mandates worldwide air traveller profiling (erdi.org)
The short, but intense solution for Meltdown and Spectre from CERT is to upgrade your CPU. (update: As you can see by this URL, they have a more detailed solution now) Your operating system provider will be sending out a Continue reading How to protect against Meltdown and Spectre
If you’re ready to stop providing an advertising company with full access to all ofÂ your email communication, there are other alternatives out there. This is especially important for any non-American, as the American intelligence apparatus is specifically built to Continue reading Time to leave Gmail? Here are some privacy centric alternatives.
I’m often asked which browser I use. Both Chrome and Firefox have a more privacy centric alternative now, Iridium Browser and Firefox Focus respectively. Of course if you want real privacy and are OK with the slowness that comes from Continue reading Privacy Centric Browsers
[NOTE: Senior Advisor Kris Constable submitted this to HuffingtonPost, but due to the time zone differences and the severity of the issue, we have decided to post the article here in the interim] When you connect to a wireless access Continue reading Wifi as we know it can be compromised
I’m often asked about secure websites. For example, should you trust the connection with your computer and your bank’s website? The article is going to get a little technical, but hopefully will give you the tools to know which websites Continue reading Secure websites
I recommend you start asset cataloging before you have a vulnerability assessment done on your organization as you need to know what the assets are you’re trying to protect. The cataloging process is similar to the vulnerability assessment process in Continue reading Asset Cataloging
These are the three browser plugins for device protection I recommend you install. The first one is arguably more important than anti-virus, and takes a while to get used too as you have to enable scripts on pages you trust. Continue reading Browser plugins for device protection
The next time you think you’re having a private online chat with a family member, you might want to think about who can read, watch, or log that conversation. The most popular solution in North America is skype, so let’s Continue reading Who can read your chat?
If you’re wondering what the top 3 steps to protect your computing device, this post is for you. It’s important to note I said device and not computer, as the same should apply to any device with a browser, including Continue reading The top 3 steps to protect your computing device