It is a known issue that a hacker access the webcam and mic on your device without your consent and awareness. You can take the help of a tape but it can’t be considered a wise solution. An ex-NSA hacker has created an anti spying tool for OS X which alerts you when an application tries to access the FaceTime camera and mic.
Deleting your files isn’t good enough. Not even if you empty the recycle bin afterwards. Nor is formatting the drive. There are plenty of ways to recover data in such circumstances. Instead, you need a specialist program that can wipe the entire drive by storing random data onto every part of it, multiple times.
There are many password managers for Windows and OS X, but here we’ll look at some of the best password managers for Linux. With so many online accounts on the internet, it can be tediously difficult to remember all your passwords. Many people write them down or store them in a document, but that’s plain insecure.
Source: 10 Best Password Managers For Linux Operating Systems (Fossbytes)
With plenty of password managers out there, it can be difficult to choose the best one for you. Here is a list comparing free password managers.
Source: Free Password Managers Compared: Which One is the Best for you? (Make Tech Easier)
Many Mac users running a modern version of OS X El Capitan have noticed the Secure Erase Free Space feature has gone missing from Disk Utility. What the “Erase Free Space” feature did (and still does in prior versions of Mac OS X) was overwrite the free space on a drive to prevent file recovery, adding a layer of security and privacy to file removal, much in the way that Secure Empty Trash performed a similar function of overwriting data after removal.
Source: How to Secure Erase Free Space on Mac Drives with OS X El Capitan (OS X Daily)
Last week, Opera added a VPN to the dev version of its browser, which was certainly good news. The bad news is that unlike the more robust VPNs it tries to replace, it leaks data that should be encrypted all over the place, namely your private IP address. Here’s how to fix it.
Source: Stop Opera’s New VPN from Leaking Your IP Address (Lifehacker)
In this tutorial, I will explain how to use Let’s Encrypt to obtain a free SSL certificate and use it with Nginx on Ubuntu or Debian Linux.
Staying anonymous on the Internet might not necessarily mean the same as surfing the web safely but rather keeping yourself safe from prying eyes that may otherwise take advantage of the vulnerability of your system thereby exposing you and your data for whomever might just be up for the grabbing – especially some hacker snooping around for sensitive data to hoard (particularly if you’re being targeted) and use for otherwise evil purposes that can have some serious effects on the violated individual.
However, for whatever reason you might want to remain anonymous or unidentifiable (if you may) on the net, in this article is our pick of tools that will help you achieve your purpose effectively without the risks that usually come with surfing the Internet unprotected.
Source: Top 5 Best Security-Centric Linux Distributions Of 2016 (Tecmint)
There are people who don’t do enough to protect their privacy online (like those who use the exact same password for every site they visit) and then there are the people who are ultra-concerned about protecting their privacy and covering their tracks online. This article is clearly intended for the latter group.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.
With gitnonymous project, now you can obfuscate your true identity when making Git commits and pushing to public repositories.
Source: Contribute Anonymously To Git Repositories Over Tor With Gitnonymous Project (fossBytes)