Karen Gullo on government monitoring

Karen Gullo on government monitoring

Karen Gullo is an analyst and senior media relations specialist for Electronic Frontier Foundation (EFF). She is an award-winning journalist who has written for both The Associated Press and Bloomberg News. Her writing has focused on the intersection of law, politics, and technology. In her current role, Gullo supports EFF’s mission of defending civil liberties and enhancing rights in the digital world.

If you would like to learn more about Karen and her work, you can follow her on Twitter or read her past articles and blog …

June 16, 2020 • 10 min read
What is Tor?

What is Tor?

We’ll answer some common questions we’ve heard about Tor — touching on issues of functionality, safety, and privacy.

June 10, 2020 • 12 min read
What is a DNS leak?

What is a DNS leak?

A security flaw known as a “DNS leak” that can reveal all of your web activity to your ISP — even if you’re using a VPN!

June 9, 2020 • 4 min read
New unc0ver jailbreak works on all modern iOS devices

New unc0ver jailbreak works on all modern iOS devices

Just as Apple released iOS 13.5 to the world, hackers at unc0ver announced that they had developed a jailbreak that would work on devices running iOS 11 all the way up to the brand new iOS 13.5.

In what follows, we’ll try to answer some common questions about the unc0ver jailbreak. Along the way, we’ll discuss the whys and whats of jailbreaking, and explain what it all means for average iOS users in terms of security and privacy.

What is unc0ver?

Unc0ver is a jailbreak tool for iOS devices. It can be loaded …

May 27, 2020 • 7 min read
The Senate votes for warrantless surveillance. Here’s what you can do.

The Senate votes for warrantless surveillance. Here’s what you can do.

The U.S. Senate recently voted to allow law enforcement and intelligence agencies to access people’s web and search history without a warrant.

In this article, we’ll unpack what that means for people living in or visiting the United States — and we’ll tell you what you can do about it.

The legal background

The vote was part of the debate over the re-extension of the Patriot Act, an Act of Congress passed shortly after the September 11 terrorist attacks. 

The law grants government agencies broad surveillance powers when conducting investigations that bear on matters …

May 20, 2020 • 7 min read
Getting back to security basics

Getting back to security basics

The Covid-19 pandemic has changed the way we live, work, and study — and has created new digital security and privacy issues as well. 

But as they say, sometimes the more things change, the more they stay the same. 

In this short piece, we’ll share three recent news stories about cybersecurity threats brought on by the coronavirus crisis. Then we’ll explain how following “the basics” of good personal security can keep you safe from these threats (and others like them).

Phishing Awareness

More people than ever are working from home — many of them …

May 20, 2020 • 7 min read
Is XProtect enough to keep you safe?

Is XProtect enough to keep you safe?

Mac malware threats are now increasing more rapidly than their Windows counterparts. With threats to macOS growing more prevalent and sophisticated, many users are starting to wonder if Apple’s native security features are enough to keep them safe.

In this article, we’ll examine one of these built-in Mac protections: XProtect. We’ll take a look at what XProtect is, how it works, and how it stacks up against third-party anti-malware solutions.

What is XProtect? 

XProtect is Apple’s basic malware detection service for macOS, part of the Gatekeeper security feature. XProtect scans downloaded files for …

May 18, 2020 • 7 min read
The difference between a VPN and a proxy

The difference between a VPN and a proxy

You’ve heard of VPNs, and you may have come across the term “proxy” or “proxy server” before. If you’re like most people, you may be wondering if there’s actually a difference between the two — and asking yourself whether or not a VPN is more secure than a proxy.

The short answer is that VPNs and proxies perform similar functions, but do so in different ways. Depending on your needs, one of them is probably a better choice than the other. 

In this short article, we’ll explain the differences between VPNs and …

May 18, 2020 • 7 min read
Kaiji malware: a new IoT threat

Kaiji malware: a new IoT threat

Security researchers have discovered a new family of malware, dubbed “Kaiji”, that targets Internet of Things (IoT) devices and Linux servers.

May 13, 2020 • 6 min read
What is Fleeceware?

What is Fleeceware?

The term “fleeceware” was coined by the British security researchers who have been investigating it. It refers to apps that charge an excessive monthly subscription fee after a brief trial period has ended — even if a user has uninstalled the app from their device.

April 17, 2020 • 6 min read
Apple and Google Develop Covid-19 Contact Tracing Tool

Apple and Google Develop Covid-19 Contact Tracing Tool

Apple and Google have announced that they’re working together to create a Covid-19 contact tracing framework for mobile devices. In this piece, we’ll tell you what you need to know about this important new technology.

What is it?

The joint project is aimed at developing a Bluetooth-based contact tracing system that will alert iOS and Android users if they’ve come into contact with someone who has been diagnosed with Covid-19.

When will it be available?

The system is being deployed in two stages. In May, Apple and Google plan to release APIs (Application Programming …

April 14, 2020 • 7 min read
Teaching computers to kids

Teaching computers to kids

With schools closed indefinitely, many of us are looking for ways to keep our kids engaged and occupied at home (without just plonking them down in front of the TV for hours at a time!).

April 13, 2020 • 5 min read