Featured post
img_2820_scandal-nude-pictures-of-jennifer-lawrence-leaked-on-the-internet.jpg

Scandal: NUDE Pictures Of Jennifer Lawrence LEAKED On The Internet

Scandal: NUDE Pictures Of Jennifer Lawrence LEAKED On The InternetJennifer Lawrence is the latest victim to fall prey to the online hackers. Nude images of Jennifer Lawrence have leaked online. The images were reportedly obtained through Apple’s iCloud service…

Continue reading

Featured post

iPhone Privacy

The iPhone privacy promised by Apple doesn’t always work, but the blame for breaches of privacy on the iPhone isn’t exclusively the fault of Apple. A case that illustrates this is the privacy attack by Google on the iPhone.

Back in the spring, Google was accused of bypassing Apple’s security wall in order to spy on iPhone users and build advertising profiles. This lead to recriminations against the search engine giant that it was sleazy and engaged in criminal activity. Many people questioned whether Google was also engaged in spying on Android users.


Continue reading

img_2891_how-to-surf-the-internet-anonymously-tor-browser-and-help-people-be-anonymous-2014.jpg

How To Surf The Internet Anonymously (Tor Browser), And Help People Be Anonymous (2014)

How To Surf The Internet Anonymously (Tor Browser), And Help People Be Anonymous (2014)My video on how to surf the internet completely privately and anonymously, as well as how to run a TOR relay yourself. Here is the link to download TOR: http…

Continue reading

img_2885_good-morning-america-featuring-private-wifi-public-wifi-may-not-keep-your-data-secure.jpg

Good Morning America Featuring PRIVATE WiFi: Public WiFi May Not Keep Your Data Secure

Good Morning America Featuring PRIVATE WiFi: Public WiFi May Not Keep Your Data SecureGood Morning America investigates the risks of keeping your private information secure when using open WiFi networks. Mara Schiavocampo is on the scene with PRIVATE WiFi’s CEO Kent Lawson to…

Continue reading

img_2873_vc-dc-episode-4-the-u-n-zero-rating-and-net-neutrality.jpg

VC/DC Episode 4: The U.N., Zero-rating and Net Neutrality

VC/DC Episode 4: The U.N., Zero-rating and Net NeutralityVC/DC examines the accident-prone intersection of policy and technology. This episode looks at international efforts to govern the Internet, and how a rigid approach to net neutrality actually…

Continue reading

img_2871_antivirus-software-overview-trend-micro-security-2015.jpg

Antivirus Software Overview – Trend Micro Security 2015

Antivirus Software Overview - Trend Micro Security 2015Protects against malware by identifying dangerous links in search results, websites, social networks, emails, and instant messages. Blocks viruses, spyware, worms, and Trojans, preventing infection…

Continue reading