Top Stories privacy
- Hackers' Kit Bag: The Tools That Terrorise The Internet
- How Your Phone Became A Secret Tracking Device
- How Data Retention Makes Us All Suspects
- How To Test Your PC For The New 'Superfish' Security Vulnerability
- What To Do If You Lose The Master Password To Your Password Manager
- Google Still Cares More About Profits Than Privacy
Writing is a deeply personal habit. There are plenty of ways to beat writer’s block, but if you want to get the words flowing and improve the quality of your writing, keep at least one journal you never intend for the world to see.
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the money, more so for the glory of mastering the arcane technicalities of computing. Hackers form a community where the most “l33t” (pron. “leet”, short for “elite”) hackers gain the most respect.
Dropbox (and similar cloud services) are awesome, but they don’t give you that much control, security or privacy over your files. If you want to take control into your own hands without losing the features of cloud syncing services, BitTorrent Sync is the service for you. Here’s how to use it.
Security researchers have discovered a vulnerability in a piece of adware called Superfish that makes your computer vulnerable to all kinds of attacks. Superfish ships preloaded on many Lenovo computers, but can also be installed on any machine. Here’s what’s going on and how to test if you’re infected