secure |

How to Secure Your Social Network Privacy for the New Year

People are starting to wake up to the threat an unsecure social media account poses to their online privacy and security. It’s time you secured your accounts. Read the full article: How to Secure Your Social Network Privacy for the New Year MakeUseOf

Your WhatsApp Isn’t Secure! Here’s What You Need to Do

WhatsApp is among the fastest growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy. This is above and beyond WhatsApp’s built-in end-to-end encryption. It’s enabled by default and can’t be turned… read more »

What Is the Most Secure Mainstream Browser?

The battle for the best desktop browser will never be settled. There are those who will always swear by Google Chrome; others who hold Safari up as the clear winner; and even some who have stuck by Internet Explorer (IE) despite constant press negativity. Even defining the qualities for what constitutes as “The Best” is… read more »

Closing Up the Cottage? 8 Smart Gadgets to Keep It Safe and Secure

Smart home devices are great for adding convenience to your everyday life, but they can also play a really important role in keeping an eye on your vacation house, your short-term rental, or on your home while you’re out of town. With everything from smart plugs to an all-in-one smart home solution, you can figure… read more »

How Google Play Protect Is Making Your Android Device More Secure

Yes, Google has a yet another rebrand. This time, Google is pooling in all of its Android-related security features and putting them under a new umbrella: Google Play Protect. This means there’s a new home and name for some of the features you’re already familiar with. Plus new features based on new security technologies. Android… read more »

How to Safely Test Desktop Applications in a Secure Container With Docker

Docker is a “container” platform, which allows applications to be run in their own sandboxed world. These applications share resources, e.g. things like hard drive space or RAM, but otherwise can’t interfere with programs running on the host system. For corporate servers this means an attacker may not be able to use a compromised web… read more »

What You Need to Know about Windows 10 Secure Boot Keys

In what could be absolutely considered a glittering example of exactly why golden keys offering a backdoor into secure services shouldn’t exist, Microsoft accidentally leaked the master key to their Secure Boot system. The leak potentially unlocks all devices with Microsoft Secure Boot technology installed, stripping their locked operating system status, enabling users to install their… read more »

What Is The Most Secure Mobile Operating System?

Battling for the title of Most Secure Mobile OS, we have: Android, BlackBerry, Ubuntu, Windows Phone, and iOS. Which operating system is the best at holding its own against online attacks? Read the full article: What Is The Most Secure Mobile Operating System? MakeUseOf

Sidebar