ctemplar

15 Easy Ways to Make Your Android Phone or Tablet More Private and Secure

Recently, a very close acquaintance of mine had his mobile phone stolen and had to get a new one. Luckily, he was smart enough to immediately block it and he already had two-factor authentication set up on another device, so his data was well protected and there wasn’t much the thief could do. Now, this […]

November 30, 2023

14 Smart Things You Should Do to Secure Your Home Wireless Network

If you’re reading this article, there’s a good chance that you’re accessing the Internet from a WiFi home router. Maybe you are also not the only one with access to this router. The other people in your home, like your family members, will also probably know your WiFi password. Perhaps some other people as well. […]

What is Browser Fingerprinting and can You Stop it?

By now you are probably aware that almost wherever you go on the Internet, someone will try to track you and collect your data. Websites, for instance, use cookies. These are small data packets that the website stores on your device upon your first visit and they hold data that gives the website information about […]

What Does Incognito Mode Do? Are You Really Hidden When Using it?

What do you do when you need to search for something online but don’t want your search to appear in your browsing history? You probably turn on incognito or private mode (depending on your browser). But what does incognito mode do and is it really private? Let’s find out. What is Browser Incognito Mode and […]

About

Inspired in the ways of the medieval Knights Templar, the CTemplar mail was created to provide an anonymous and end-to-end encrypted mail to anyone who needs their communications shielded from prying eyes. We at CTemplar recognize the value in cryptography and cryptocurrency, hence the name “CTemplar” or “Crypto Templar”. We provide an anonymous and end-to-end […]

All About 5 Eyes, 9 Eyes and 14 Eyes Surveillance Alliances

Powerful countries have always looked for ways to gain more information about their adversaries (and non-adversaries) and surveillance is one of their main tools in this.  However, true global surveillance as we know it today really took off at the end of World War 2, when the United States and  the United Kingdom entered the UKUSA […]

What is a Browser Hijacker and How to Get Rid of it?

The more time you spend online, the more your data becomes exposed if you don’t do anything to secure it against malicious intrusion and hackers. One of these malicious intrusions, which can be very dangerous, is browser hijacking. If you want to know what is a browser hijacker and how to remove it, read this […]

How to Tell if Your Computer Has been Hacked and What to Do to Fight Back?

One of  the worst fears that most computer users have (or should have) is the fear of their computer being hacked. However, do you know how to tell if your computer has been hacked or what to do in that case?  In this article, we are going to explain why hackers want to hack your […]

What is Identity Theft and How to Ensure That Your Identity Does Not Get Stolen Online?

Identity theft is not a new problem and it has been around for a long time. Now, however, with most people moving their business online because of the world-wide pandemic, identity theft, especially online identity theft, has become an even greater problem.  In this article, we are going to discuss some important identity theft facts […]

How (and Why) You Should Delete Google Search History (and is it Really Deleted?)

So, you searched for something you “shouldn’t have” and are now afraid that someone might find out and get you into trouble. That’s fine, because you can delete Google search history and never get discovered! But is deleting your Google search history really the magic bullet? Unfortunately, just like “Incognito” mode, which we busted the myth […]

How (and Why) You can Encrypt Your Android Device?

How much of your life is on your Android? Judging by the fact that you spend nearly three hours every day on mobile devices, probably a lot. But here’s another fact that might open your eyes: An average of 10,000+ malicious mobile apps was blocked in 2018, according to a cybersecurity company Symantec. What does this say? […]

How to Encrypt Email on iPhone

The iOS might be trailing significantly behind Android, with a 27.43% market share in March 2021, but with around 900 million active iPhone users, it is still a big market and if you are among those users, you might want to know how to send and receive encrypted emails on your iPhone. This helpful article will […]

PGP Encryption: How It Works and How to Install PGP on Linux?

Today PGP, or Pretty Good Privacy, is pretty much the standard in email security and encryption. If your email provider doesn’t protect you with PGP encryption, it’s not really secure. But what is PGP and how it works? In this article, we’ll go over what PGP is and how it works and also show you […]

Help! Someone Hacked My Email Account! 6 Important Steps to Deal with a Compromised Email Account

Can someone hack you through email? They can if you are not careful about what you click on or open. In this article, we’ll cover: Protecting your electronic mail is important if you want to protect your privacy, so let’s start by answering the first question: How Do Hackers Get Into Email Accounts? According to […]

Enterprise Data Security (And What You Can Do About It)

Data security is important on all levels, from an individual to an organization. However, the impact that a failed data security has is much greater the bigger an organization is. The more your business grows and as the amount of data you have grows, enterprise data protection becomes increasingly important and something you need to […]

How and Why to Make Your Email Comply With the HIPAA Security Rule?

If you are working in the healthcare industry or are a patient, you’ll likely encounter numerous security policies and procedures. One of the most important pieces of legislation that benefits both healthcare organizations and patients is the HIPAA Security Rule. What is HIPAA and why is it important that your emails comply with it? Let’s […]

What is a Ransomware Attack and How to Avoid it?

According to The State of Ransomware 2020 study by Sophos, which included 5,000 IT managers from 26 different countries, 51% of respondents said that they were victims of ransomware that year. On average, the cost of a ransomware attack in the U.S, Canada and Europe was $312,493 in 2020, up from $115,123 in 2019, according to Computer […]

What is Password Encryption and How Does it Work?

Okay, so you have some documents, files or other data that you want to protect. How do you do that? The standard way is to put a password on it so that only the people who know the password can open the data. Unfortunately, a password alone is not nearly enough to keep your data […]

18 Types of Cyber Security Threats You Should be Aware of and How to Deal With Them

With cybersecurity threats all around us, how can you ensure this doesn’t happen to you or your business and the hacker walking away with vast amounts of data? It starts with “knowing thy enemy” and that means knowing what types of security threats is your business most likely to be targeted by. In this article, […]

Why You Need a Custom Domain Email Address?

So you’re ready to start a new online business? You will first need a website and that means having a good domain name. Now tell me, which one of these two sounds more professional to you and which are you more likely to do any business with as a customer? mybusiness.wordpress.com, or mybusiness.com? I’d imagine […]