Wi-Fi security: How to stay safe while connected
Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators and users. Operators of Wi-Fi...
ExpressVPN fixes “Voracle” compression vulnerability in apps
Update: Since October 24, 2018, our manual config servers are not vulnerable to the VORACLE exploit. At a Black Hat Briefing in August 2018, the...
6 easy ways to improve your online privacy and security
To protect your online privacy, look to the security of your devices, social media, logins, chat apps, and more.
How brute-force attacks reveal your passwords
A brute-force attack is an attempt to discover—or “crack”—your password through repeated guessing. On public-facing login screens, most web services limit the number of times...
The secret codes that nobody can crack
Remember back in school, when you and your best friend would exchange secret notes across the classroom in code? The two of you muffling...
4 ways to back up your data securely
Photos, documents, saved video games, and old emails: We accumulate a lot of data throughout our lives. And just like our parents’ attic, our...
How to make a small server for your home
A guide to installing a small server in your own home, and cool things to do with it. Lexie shows us how with Linux (Ubuntu).
Girl Scouts are our next wave of cybersecurity experts
Do you know what badges Girl Scouts are collecting these days? It’s not just Hiker, Making Friends, and Cookie CEO anymore. With a strong...
PGP is still pretty good for privacy
Many privacy advocates use PGP (GNU Privacy Guard/GPG in its open source form) to encrypt, sign, and verify data and text of all sorts. PGP...
Why you should use a unique password for every online account
So, you’re signing up for yet another online service. It’ll probably ask you to choose password with rules like: Must have at least eight...