Blog
Stay informed with our latest publications.

Your Guide to Android Permissions: When to Accept and When to Refuse App Permissions?
Does this message look familiar? Most apps out there will ask for access to some of the features on your phone the first time you open it. This can be location, camera, microphone, photos, phone calls, messages and more. Here’s the question: should you always allow Android app permissions? In this article, we’ll show you […]
April 22, 2022

What is Cyber Warfare and How is Cyber War Waged?
Despite the current conflict in Ukraine, our modern society sees a lot fewer armed conflicts than 3-4 decades ago for instance. Most countries realize that it’s better to “play nice” with others, rather than pull out their guns and risk the lives of their people for what usually amounts to little to no gain. That […]
April 17, 2022

How to Detect Stalkerware Apps on Your Mobile Device and Protect From it?
Put down your mobile phone for a moment. Someone might be spying on you as you are using it. In this article, we’ll explain how to detect stalkerware on your both Android and iPhone mobile devices and how to protect yourself from it. What is Stalkerware? In 2019, Google discovered and removed 7 stalkerware apps […]
April 13, 2022

Security and Privacy in the Metaverse: How to Keep Your Virtual Life Safe?
On 28th October, 2021, Mark Zuckerberg, the CEO of Facebook, introduced a radical change to the biggest social network and his other services at the Connect 2021 conference. That change was the shift from the digital world and social media platforms to augmented reality and virtual reality, or the metaverse (the term coined first by […]
April 11, 2022

What is the Difference Between XSS vs CSRF Attacks and How to Prevent Them?
XSS and CSRF are two of the most common client side attacks. However, they are very different. In this article, we’ll take a look at the difference between XSS vs CSRF attacks and what you can do to prevent these two attacks. What is a Client Side Attack? Before we start explaining what are XSS […]
April 10, 2022

The Educator’s Guide to Student Privacy: How to Protect Student Data?
The notion of what counts as “student data” has changed drastically in the last few years. While before student data referred mostly to the student’s name, address, age, demographics, what course they’ve taken and their final grades, with the spread of information technology, including computers and mobile devices and the students themselves generating huge amounts […]
April 9, 2022

Can Someone Track My Phone Even if I Have Location Tracking Off?
Most people today can’t live without a mobile phone in their pocket. Everywhere they go, they absolutely must carry it with them or they will miss the most important phone call of their life or someone will post something monumental on social media. The truth is that the world will keep spinning even if you […]
April 2, 2022
CTemplar Recognizes Protonmail’s OpenPGPjs Maintenance
Edward Snowden stated: “Encryption, is the single best hope for fighting surveillance of any kind. If all our data, including our communications, were enciphered in this fashion, from end to end…then no government—no entity conceivable under our
Email Comparison Table
Comparison tables are often used to show the differences between services. We respect these services, we have reviewed this table with both services and even recommend to them our users when we are not able to meet demand. This is an analysis of t
Our pricing explained
Why the Price? Providing an encrypted email service costs money. Some companies, like Gmail and Yahoo, offer free email because they profit from collecting and selling your personal information. We charge a subscription fee because
Android App Open Beta Available
We are pleased to announce that we have launched our Android mobile app for beta testing. The app is available for all Android users by visiting the Google Play store. You can also find it by clicking this link. Open Source Android Code –&nb;
CTemplar Whitepaper
You can download our whitepaper here! Latest revision on: April 4th of 2022 Name: CTemplar Whitepaper.pdf Size: 518487 bytes (506 KiB) SHA1: 1ac150c0377aa6f781dffa050486ad3b1264e88c SHA256: b31159c77f7ef7a952cfc678dc9a7279b89c49bb35b965199657130e20
Privacy as Seen Through Fourteen Eyes
The history of citizen surveillance boils down to one simple theory: The more eyes you have watching citizens both friend and foe, the easier it is for governments to maintain peace and order. The first two countries in the world to recognize
CTemplar’s 4 Wall Protection
4 Wall Protection was defined by the CTemplar team with the goal of helping people review their privacy needs. Imagine that your privacy is a four-walled fortress. If a wall is missing, then an enemy can quickly get into your fortress. Therefore
Zero-censorship policy
We pledge to our community that we will not use censorship to hide negative press about our company. Instead, we will publish negative or unedited articles about our company on this page with credit to the author/researcher. If you do no
Transparency Report
Warranty Canary: No law enforcement agencies have been here. Watch for this statement’s removal or change. (What is a Warrant Canary?) Zero censorship policy. We do not censor harmful or revealing content about our company. We will pub
Email Creation Restriction
Recently we have limited free account creation by invite only. In the future, we might disable all new account creation for both free & paid. We sincerely apologize for this inconvenience and we want to explain why this is happening.
Our apps are available
Our CTemplar email apps for Android, F-Droid & iOS have all been released. We ask for your patience as we find and resolve any remaining bugs. That being said, when you report a bug to us we consider it a gift. You are showing us
How to Anonymously Email Someone?
What is anonymous email? There are situations when you want to avoid having your identity, including your own email address and other personally identifiable information (PII) to be known by the recipient. In those situations, you would need
How to Create an Anonymous Email?
Did you ever sit down to write anonymous email? There's a ton of things we can't just casually write about to someone in an email. Well, that's not entirely true. Or at least, it's true only for your regular emails like Gmail, Outlook, Y
What does it mean to Encrypt an Email?
Try to imagine the Internet without the email. It doesn’t work, does it? The two just go hand in hand and are almost inseparable. You probably have at least one email account if not more. The email was and still is crucial for communicat
How to Delete Emails Instantly After Sending
Have you ever sent an email that you instantly regretted after hitting “send”? Maybe you sent an email to the wrong person or it was an angry mail to your boss, telling them (in not so kind words) what you think about them? Whatever the reason, y
How to Send a Secure Email
If you’re like most people, you probably check your inbox at least 1-3 times per day, according to Statista. That’s 1-3 opportunities to receive malware or other malicious threats straight to your inbox, as 94% of malware gets delivered via
How to Send Documents Securely Over Email
What do you do when you need to send sensitive information via email? Simply putting an attachment to your email message is easy enough to do, but so will intercepting it be for someone other than the intended recipient. If the attachmen
The Insider’s Guide to Anonymous Email
Living in a digital world has its fair share of advantages. But you often trade our anonymity and privacy to be able to enjoy them. And you do that without a second thought. Sometimes, however, you don't want the other side to know it was you
How to Get Anonymous Email? It’s Easy If You Do It Smart
Did you ever wonder how to get anonymous email but kept shying away from it because you thought it to be complicated? Or you had to know how to set up a proxy server? And what about encryption? Shouldn’t you know a thing or two about that?
Master The Art Of Anonymous Email Addresses
If you’re using email, you already know it’s a very convenient and easy way to communicate. Just write a message, click “Send” and the other side will get it almost immediately. Even if they are on another continent. Few online communica
Best Anonymous Email Provider With Android Apps
How much do you access your email from mobile compared to desktop? And also, how much are you concerned about your email privacy when using email on mobile devices? It probably won’t come as a big surprise if I tell you that people are u
How to Bypass 2FA Gmail Protection and Google 2-Step Verification on Android Devices?
2FA is a great way to add extra protection to your online accounts beside a username and password. But, what if you need to turn off 2FA? Is it even possible to bypass 2FA Gmail security? It is and if you need to bypass 2FA or factory reset pr
Top 7 2020 Email Security Trends You Need to Watch Out For
Email was invented nearly five decades ago (48 actually). But that does not mean it has remained stagnant. On the contrary, it has evolved countless times since 1972 until this day. We have seen new email providers come into the picture, sa
The Best Open-Source Email Service
Why is CTemplar Using OpenPGP Encryption? In the technology community, that we at CTemplar are a proud member of, many new technologies are made through a collaboration between programmers, developers, engineers, and other experts. This ensures t
The Best 7 Free Email Security Tips for Keeping Your Account Anonymous
Besides being responsible for 397 thousand deaths (and still counting) and grinding the world economy to a near halt, the Covid-19 is responsible for another, more subverted danger. It's yet another excuse for governments to take away our o
Most Costly Email Security Mistakes That Can Cost You Millions
Cybersecurity threats constantly loom over us. Among them, none can be as dangerous and damaging as those related to email security. Whether you create a private email account or a business, these threats are ever-present. For example, according to
How to Make an Email Without Phone Verification?
What is phone number verification? Phone number verification allows you to learn if a phone number you've dialled exists, is connected to a network and can receive calls. When it comes to Gmail and other email providers, phone verification is als
How CTemplar Over Tor Makes Your Email More Anonymous and Secure
If you want to send an anonymous email to someone, it is not enough to simply use a fake name or not use your regular email address. There is plenty of other information that can give away your location or identity on the web. This includes
Everything About Anonymous Email You'll Ever Need to Know
Imagine going through your day and someone behind you is recording your every step. Where you went to work, who you visited, when you went shopping, what you bought, etc. It wouldn’t be pleasant and if you say that person following you around,
How Secure is Your Email Without the Encrypted Email Service?
For the past couple of years, you might have heard that email is obsolete and dead. Well, rumors of its death have been greatly exaggerated. Email is very much alive and kicking, especially in the business world where an average office worker receiv
CTemplar: Encrypt Your Gmail With OpenPGP
When using Gmail it is important to understand how the email service protects your privacy and information. This is done through encryption. Encryption is a process that takes the readable text and alters it into a ciphertext. The ciphertext a
How to Access an Email Service on the Dark Web?
The web is a vast place where you can find information on almost anything from news around the world, latest sports results, funny memes, instructional videos on how to fix a car and many, many more useful and not-so-useful things. However,
How to Get On the Dark Web and Safely Email Someone From it?
Today, there are over 4.6 billion Internet users as of May 31st in the world, out of almost 7.8 billion people in total, according to the World Internet Users Statistics for 2020 Q1. In other words, almost 60% of people although mostly in developed
What is PGP Encryption? Everything You Need to Know About Pretty Good Privacy
Today, we are far from lacking in online communication options. The Internet provides us with multiple ways to connect with other people all around the world, including Skype, Slack, Google Hangouts, online forums, Twitter, Discord and so on. How
What is S/MIME and Do You Need it?
Is your spam folder full? That’s good because it means that your email client’s filters are doing the job. But what if I tell you that they are not able to identify ALL of the spam and phishing emails you get. Some of those still slip throu
What is TLS Encryption and How it Makes Your Email More Secure?
As interest in the more commercial and public use of the Internet started to grow in the 1980s and 1990s, it soon became apparent that it would be necessary to somehow secure communications between web applications and servers. As such, many comp
What is Spear Phishing?
Imagine two fishermen catching fish on a lake. One is throwing a net and is catching a variety of fish, most of them small. Maybe he catches something big enough, but maybe not. The other fisherman, on the other hand, has a different approa
How to Identify a Malicious or Phishing Email?
The COVID 19 pandemic has forced most organizations to leave their offices and shift more toward working remotely and from home. This is causing a bigger reliance on email to communicate within the organization and, as such, more risk for email phis
How to Securely Email When Working Remotely?
With the COVID 19 global pandemic shutting most of the world inside most businesses have shut down their offices and have sent their staff to work from home. While this eliminates the risk of someone getting infected by the coronavirus and spread
The Best Email Security for the Enterprise
For many organizations, the email is still the number one communication tool for both internal (within the company) and external (with clients, customers and partners) communication. It’s not easy to replace email (at least not completely)
Why Every Lawyer Needs to Encrypt Their Email?
Confidentiality has always been the most important element in the lawyer-client relationship. From the first time one person asked another to defend them in the court, the two have made a contract (first verbally and then in writing), that the lawye
Why Cannabis Buyers Should Use CTemplar Anonymous Email?
Are you interested in buying cannabis, but are worried what others might say if they find out? If that’s the case, let’s talk about secure email for cannabis professionals and why it is important to use encrypted and anonymous email service when doi
What is a Man-in-the-Middle Attack (MitM) and how to Prevent it
A “man-in-the-middle” attack takes place when a third party (cyber attacker) intercepts the transaction of data and information between two other parties and modifies it to steal sensitive information from them. In this article, we are going to look
Make Sure Your Email is Safe with Zero-Knowledge Encryption
If you count on online services and providers to keep your sensitive private and financial information secure, you are taking a huge risk. Instead of going after the user himself for the password, hackers today go after the provider, well aware of t
3 Ways People Can Find Your IP (But Not With CTemplar)
Your data is regularly bought and sold by online data companies, usually without either your knowledge or consent. One of the most common pieces of data these companies buy and sell is your IP, or internet protocol address. Your IP can reveal a lot
This SMTP Injection in G Suite Allows Google Email Domains to be Spoofed
A lot can be said about Gmail relying on outdated and often unsecure protocols. For instance, we’ve already covered here on our blog how hackers were able to bypass Google’s 2FA security back in 2018. That’s just one example. One new example of
What is a Business Email Compromise and How to Protect Against it?
Email fraud can take different forms. Email security mistakes cost businesses billions of dollars per year. One particularly effective and dangerous type of email scam is the business email compromise attack, or BEC attack. What is a BEC attack?
Email Cyber Attacks are on the Rise. Protect Yourself, Don’t Wait to Get Hacked
Email cyber attacks are nothing new. They have been around in one form or another almost since email was first introduced. The first recorded instance of a spam email can be traced back to 1978 (the first email was sent in 1970, so just 8 y
How CTemplar Can Help Journalists in Their Work?
The journalist profession is full of danger. According to the UNESCO Observatory of Killed Journalists, 1402 journalists have been killed since 1993. In the last decade (2010-2020), there have been 923 journalists around the world who have lost thei
CTemplar Mobile Code is Now Open Source!
Today, we are happy to announce that we have released our CTemplar mobile code as open source! With this, we continue our mission for open source email software and encryption that we are dedicated from day one here at CTemplar. What this means i
What Journalists Need to Know About Digital Safety and Security?
The Internet and the digital era have disrupted many industries. Some, like real estate, marketing, commerce, etc. have found a way to thrive in the new digital world, while others like brick-and-mortar booksellers, language translators, travel agen
What is a CEO Fraud and How to Prevent it?
Today companies and their employees need to be very aware of potential online scam dangers. Cybercriminals have become very sophisticated not just regarding the technologies and software they are using, but also in being better able to impersonate l
What is a Pharming Attack and How to Prevent it?
Hackers and scammers have become very proficient at what they do to the level that very often their victims are not even aware that they are sent to a fake website. Such a website is called a pharming website. Pharming is an Internet scam similar
Is Your Session Hijacked? How to Prevent Session Hijacking?
Every time you log in or access a website or server on the network you initiate what is called a “session”. Sessions represent a connection between the user’s computer or other device and a server and are what makes the exchange of information and d
Encrypted Email Frequently Asked Questions
How do I report a suspicious email? Identifying a malicious or phishing email on time is important to protect your email and its data.The process of reporting a phishing or otherwise suspicious email largely depends on the email service you are usin
Russian Hackers Attack Exim Mail Transfer Agent
As the November elections in the United States draw closer so do the fears of a repeated 2016 scenario when Russian hackers interfered in the presidential elections. It seems those worries have only gotten more fuel following the U.S. National Se
5 Useful Tips to Prevent Email Hacking
Electronic mail is an incredibly useful communication method, but it does come with certain risks. In 2019, according to Verizon’s 2020 Data Breach Investigation Report, 94% of malware was delivered by email. Email hacking in one form or another
Am I Being Tracked by the Government?
2013 was a pivotal year for online privacy. It’s not that people weren’t thinking about Internet privacy problems by then, but it took Edward Snowden’s NSA leaks to really open most people’s eyes on how their government might by tracking them online
Why End-to-End Encrypted Data is Important to Protect Free Speech
This Wednesday, on his podcast #1536, Joe Rogan had the former NSA contractor and whistleblower, Edward Snowden as a guest. In about a two-and-a-half hour-long podcast the two touched on different topics like end-to-end encrypted data. If you hav
Can the US Government Spy on its Citizens?
In most US citizens' minds, there is little to no doubt that the government is spying on them. In two separate polls, 7 in 10 (Pew Research Center, 2017) and 8 in 10 (Monmouth University, 2018) people in the United States believe that the US governm
7 Quick Tips for Internet Safety and Privacy
The Internet itself is an awesome tool that can enrich your life, but only if you use it smartly. Every year brings a new cautionary tale of Internet privacy violation and this is why we have compiled these 7 quick tips that will protect your Intern
What is a Snowshoe Spam Attack and How to Prevent it?
Although they are annoying as hell, one thing has to be said about spammers. They are inventive in finding new ways to avoid spam filters. One such “inventive” way to avoid spam blacklists is the snowshoe spam attack. What is the Snowshoe Spam Em
What is Self-Destructing Email and How It Can Help You?
Do you remember playing with invisible ink when you were a kid? Maybe you wrote a secret note that you wanted only one special person to read or you helped a buddy with an answer on a difficult exam. Well, we grew up now so we no longer use invis
Net Neutrality and Privacy: The Pros and Cons of Net Neutrality
As the 2020 US Presidential Elections draw close, we thought it to be a good idea to refresh a little on net neutrality (especially since the two main candidates don’t seem to be paying any attention to it in their campaigns). The net neutr
How to Encrypt Your Internet Connection and Make it Safer?
If you ask Internet users “do you want a more secure Internet connection?” you’ll have a hard time finding one that will answer negatively. Everyone wants a safer Internet. The problem is that most people don’t really know how to get it. At best,
What is a Network Security Key?
At CTemplar, one of our main goals is helping users be more secure online, whether through our own encrypted email service or providing useful Internet safety and privacy tips. Not everyone is an Internet security and privacy expert though. Mo
Norwegian Parliament Hit by Email Hack
Against email hackers, no one should really consider themselves 100% “safe”. This is a lesson several Norwegian Parliament employees and parliament members learned the hard way after the Stortinget suffered an email cyber attack in late August. T
What is a DNS Attack? What are the Most Dangerous DNS Attacks and How to Protect Against Them?
The Internet as we know it simply wouldn’t function without its vital part - DNS. Unfortunately, DNS has its vulnerabilities. An attack in which the hacker exploits DNS vulnerabilities is called a DNS attack and in this article we are going to explo
The Only Anonymous Payment Resources You Will Ever Need?
If you’re like 69% of Americans, you probably bought something online at least once. There are a lot of convenient ways to pay online but have you ever stopped to consider the risks of revealing your identity and credit card info so freely? Luckily,
What is the Safest Email Service for Online Business?
Even though there are plenty of ways to communicate online, for most businesses email remains the number one communication tool even in 2020. However, the more emails you receive and open, the greater the chance of something with malware attached it
ISP Selling Data Bill - Why Should You Care About it?
When we talk about online privacy, it’s usually to criticize tech giants like Google, Apple, Amazon, or Facebook for the way they collect their users’ data and then make money selling it without consent. But they are not the only ones you s
How to Choose the Best Email Security Solutions for Your Business
While there are plenty of different ways to communicate online, including chat, VoIP, text, social media and so on, for businesses, even 50 years after it first came to the scene, email remains the number one online communication tool. Today, how
What are the Best Anti-Phishing Solutions You can Use to Protect Your Email?
Phishing is a very common and often expensive problem that every email owner encounters at least once. However, it gets even worse for business email accounts. According to Cybint’s 15 Alarming Cyber Security Facts and Stats report, as many as 62
Why Your Organization Needs a Free Secure Email Account?
Does your company have a free secure email account, or are you risking your organization’s and your customer’s valuable information? Although we have seen in the recent few years organizations communicate both internally and externally in many di
What is the Most Secure Web Browser You Should Look at in 2021?
Your web browser can tell a lot about you, including: What websites you like to visit.Your usernames and passwords.Names, addresses, phone numbers, email addresses and other autofill information.Cookies and trackers that websites place on your br
How to Send Encrypted Email for Free?
In theory, an email message is a private correspondence between a sender and a recipient. In practice, it passes beneath a lot of eyes between those two and a lot of those eyes are more than curious about what’s in the email. Because of this, you ne
Why Backdoor Encryption is a Terrible Idea?
Does the term “backdoor encryption” bring a feeling of extra security or fear into your mind? Perhaps you are 100% pro-government (doesn’t have to be “this” government) and think they have every right to snoop into your private data, but if you a
What to Do if Your Information is Found on the Dark Web?
The biggest problem when someone steals your data on the Internet isn’t that they might take all the money from your credit card and then leave it. If that were the case, it wouldn’t be that much of a big deal. The real problem is what they do with
The Best Free Way to Send a Secure Email
The need to send secure email has never been greater than today. The last year has showed us why we need email encryption now more than ever. The Covid-19 pandemic, racial and police brutality protests in the United States and most recently the p
Choosing the Best Privacy Browser for 2021
A web browser is like your personal chauffeur on the Internet. It will take you to any website you want (as long as it exists and is working) in mere seconds. Without it, getting around the Internet would be very difficult, if not impossible. But
4 Email Attack Types You Should Get Ready for in 2021
We can all agree that 2020 wasn’t the best year and that we all want to forget it as quickly as possible. But surely, 2021 can only be better, right? Well, it could be or it might not be. A lot of things in 2020 hit us completely unawares, like t
How to Protect From an Email-Based Phishing Attack?
You probably received at least once an email like this: “Your account will soon be disabled for security reasons, please confirm your identity to continue using it.”, followed by a link you’re supposed to go to that would lead you to the website
Why a Pseudonym Won’t be Enough to Keep You Anonymous Online?
What is the first thing you think of when you want to be anonymous online? It’s probably using some kind of a fake name or a pseudonym. After all, this was a tried and tested method used for centuries by writers who, for one reason or another, didn’
21 Email Security Best Practice You Need to Follow in 2021
For most organizations, email is still the number one communication channel, even though a lot of them have in recent times moved to chat and VoIP. This only means that, in 2021, email security is still something to pay close attention to. In thi
German Court Strong-arms Privacy Email Provider Tutanota to Help Monitor Mailboxes
In a ruling from November, the Cologne Regional Court had pressured the privacy email provider Tutanota to integrate a function that would allow investigators to read emails in plain text and monitor mailboxes. As such, Tutanota must now develop
How to Save Yourself from Different Types of Malware?
What are different types of malware: Here are the 10 most common types of malware your device can get infected with: TrojanWormVirusGraywareRansomwareMalvertisingKeyloggerRootkitBotMobile malware. What is a RAT malware email? A RAT malwa
How to Prevent Email Spoofing Attacks?
Have you received an email that appears to have been sent by someone you know but you had a feeling there was something just off with it? That email could have been sent by someone else entirely and you might have been a victim of an email spoofing
How to Send Encrypted Email From Android?
If you are like most people (85% according to a Mobile Email Statistics report by 99 Firms), you are probably using your smartphone to check your email. However, with cyber threats around every Internet corner and potential data breaches (recently e
27 Biggest Mistakes That Can Ruin Your Email Security
What is email security? Email security is a set of procedures and techniques used in email communication to protect email accounts and data the email contains against loss, compromise, or unauthorized access. Email is a great and easy-to-use c
Email Security Roundup 2020 (Biggest Email Scams, Phishing Attacks, BECs and Data Breaches of the Year)
Q&A: What to do if you respond to a phishing email? The first thing you need to do if you respond to a phishing email is to log in to your email account from a different computer and change your password immediately. Once you do that, make sure
Is Tor Browser Safe and Completely Anonymous to Use?
Is Tor browser safe to download? Downloading Tor on your computer is safe and it’s completely legal to do so and to use it. However, keep in mind that you might get extra attention from your ISP if you do this, so it’s a good idea to hide your IP ad
Future Cybersecurity Predictions for the Year Ahead
Why Cybersecurity is important? As we grow more and more reliant on computer technologies, we also become more vulnerable. Identity theft, social engineering, hacking and other types of cyberattacks are on the rise and it affects everyone from indiv
Worst Cybersecurity Risks on the Darknet
However, to access the dark web, you will need special software called Tor. Tor is a free software available for download at Tor Project that allows you to communicate anonymously online. We explained in one of our previous articles whether To
What are Email Privacy Laws in the Workplace?
Fewer and fewer people today send emails to their family or friends. Social media and messaging apps have largely replaced electronic mail as the main way to communicate online with someone close to us. When it comes to communicating at work, ema
The Business Owner’s Easy Guide to Secure Email (with Best Practices to Follow)
Having a secure email is important for any business, no matter its size or industry. Your business email is under constant threat from hackers and other bad actors, much more so than your personal email. For instance, according to Proofpoint’s 20
How to Find Out Who Your Anonymous Email Sender is?
Sending an anonymous email can be useful in certain situations, such as when you want to protect your own identity online. We already talked at length about how to send an anonymous email and why, but what if you are on the receiving end of such an
Why Use Encrypted Email? How will it Make Your Email Secure?
One of the most common questions people might ask you if you want to do business with them is “what is your email?”. Why do they ask this? Because email is still one of the best and most reliable ways to communicate online and that is why email is i
What is Hashing? What is the Purpose of Hashing?
Let’s say you need to copy a file from one computer to another. How would you ensure that the two files (original and copy) are the same? You can use hashing to do this. What is Hashing? But what is hashing and how it works exactly? A hashi
What is Online Privacy Violation and How to Protect Yourself From One?
Be honest with yourself. How many times have you shared your data online without really considering the consequences? When signing up to a website, purchasing an item from an e-commerce store, or downloading an app, you expect the other side to hold
How Much Does Google Know About You? More Than Anyone
Do you know who knows you best? Is it your significant other? Your parents? Best friend? Your doctor? If you think the answer is any of them, you’re wrong. The one who really knows you best is Google. The amount of information t
What is DNS Leak Protection?
Using a Virtual Private Network (VPN) is a good idea when you want to protect your online privacy and have a more secure Internet connection, but even the best VPN won’t matter if it doesn’t protect you from DNS leaks. In this article, we’ll expl
What is the Best Linux Distro for Privacy and Security
Are you a Linux user or are thinking of becoming one? If so, you are probably having (or will have) constant debates with fellow Windows and macOS users about whose OS is better. Well, while Linux can’t compare with Windows and macOS on usage sha
What is Onion VPN and How it can Protect Your Online Privacy?
Are you looking for more privacy online? With so many prying eyes on the Internet, this is a tough task, but luckily, there are several tools that you can use to improve your privacy online. You probably heard of the two most important online pri
What are the Most Common Encryption Methods and Their Algorithms?
Today we live in a time when cybercrime is rampant and if you don’t protect our private information, you leave it exposed to criminals and other bad actors. Fortunately, you can use encryption to secure your data from them and get a little peace of
What is the Best Encryption Algorithm?
According to IBM’s Cost of Data Breach Report 2020, the global average total cost of a data breach last year was $3.86 million, but you as an individual are safe, right? Wrong. Just because you’re not a business doesn’t mean that you should negle
Best Internet Privacy Tools and a Privacy Guide You Need to Use to Secure Your Data in 2021
It seems everywhere you go online, someone wants to get your private information. Sometimes they are transparent about it and ask you straight up to fill an online form or similar, but often they just take your information without your knowledge or
How to Make Windows 10 More Private
One of the main reasons why Windows 10 is so popular is that Microsoft has made it incredibly convenient and easy to use. Unfortunately, like every big tech company, they too conveniently cut out on the user privacy department. The good news is that
15 Easy Ways to Make Your Android Phone or Tablet More Private and Secure
Recently, a very close acquaintance of mine had his mobile phone stolen and had to get a new one. Luckily, he was smart enough to immediately block it and he already had two-factor authentication set up on another device, so his data was well protec
14 Smart Things You Should Do to Secure Your Home Wireless Network
If you’re reading this article, there’s a good chance that you’re accessing the Internet from a WiFi home router. Maybe you are also not the only one with access to this router. The other people in your home, like your family members, will also prob
What is Browser Fingerprinting and can You Stop it?
By now you are probably aware that almost wherever you go on the Internet, someone will try to track you and collect your data. Websites, for instance, use cookies. These are small data packets that the website stores on your device upon your fir
What Does Incognito Mode Do? Are You Really Hidden When Using it?
What do you do when you need to search for something online but don’t want your search to appear in your browsing history? You probably turn on incognito or private mode (depending on your browser). But what does incognito mode do and is it reall
A Complete Guide to Cryptography
Let’s say you need to send a secret message to someone and don’t want that message to get into the wrong hands. How can you keep your information and communication secure? By using cryptography. What is cryptography? When you hear the word
All About 5 Eyes, 9 Eyes and 14 Eyes Surveillance Alliances
Powerful countries have always looked for ways to gain more information about their adversaries (and non-adversaries) and surveillance is one of their main tools in this. However, true global surveillance as we know it today really took off
What is a Browser Hijacker and How to Get Rid of it?
The more time you spend online, the more your data becomes exposed if you don’t do anything to secure it against malicious intrusion and hackers. One of these malicious intrusions, which can be very dangerous, is browser hijacking. If you want to
How to Tell if Your Computer Has been Hacked and What to Do to Fight Back?
One of the worst fears that most computer users have (or should have) is the fear of their computer being hacked. However, do you know how to tell if your computer has been hacked or what to do in that case? In this article, we are
What is Identity Theft and How to Ensure That Your Identity Does Not Get Stolen Online?
Identity theft is not a new problem and it has been around for a long time. Now, however, with most people moving their business online because of the world-wide pandemic, identity theft, especially online identity theft, has become an even greater
How (and Why) You Should Delete Google Search History (and is it Really Deleted?)
So, you searched for something you “shouldn’t have” and are now afraid that someone might find out and get you into trouble. That’s fine, because you can delete Google search history and never get discovered! But is deleting your Google
How (and Why) You can Encrypt Your Android Device?
How much of your life is on your Android? Judging by the fact that you spend nearly three hours every day on mobile devices, probably a lot. But here’s another fact that might open your eyes: An average of 10,000+ malicious mobile apps was blo
How to Encrypt Email on iPhone
The iOS might be trailing significantly behind Android, with a 27.43% market share in March 2021, but with around 900 million active iPhone users, it is still a big market and if you are among those users, you might want to know how to send and rece
PGP Encryption: How It Works and How to Install PGP on Linux?
Today PGP, or Pretty Good Privacy, is pretty much the standard in email security and encryption. If your email provider doesn't protect you with PGP encryption, it's not really secure. But what is PGP and how it works? In this article, we'll g
Help! Someone Hacked My Email Account! 6 Important Steps to Deal with a Compromised Email Account
Can someone hack you through email? They can if you are not careful about what you click on or open. In this article, we'll cover: How email accounts get hacked?Why email addresses are hacked?Most common signs that your email has been hackedWhat
Enterprise Data Security (And What You Can Do About It)
Data security is important on all levels, from an individual to an organization. However, the impact that a failed data security has is much greater the bigger an organization is. The more your business grows and as the amount of data you have gr
What is a Ransomware Attack and How to Avoid it?
According to The State of Ransomware 2020 study by Sophos, which included 5,000 IT managers from 26 different countries, 51% of respondents said that they were victims of ransomware that year. On average, the cost of a ransomware attack in the U.
How and Why to Make Your Email Comply With the HIPAA Security Rule?
If you are working in the healthcare industry or are a patient, you'll likely encounter numerous security policies and procedures. One of the most important pieces of legislation that benefits both healthcare organizations and patients is the HIP
What is Password Encryption and How Does it Work?
Okay, so you have some documents, files or other data that you want to protect. How do you do that? The standard way is to put a password on it so that only the people who know the password can open the data. Unfortunately, a password alone is
18 Types of Cyber Security Threats You Should be Aware of and How to Deal With Them
With cybersecurity threats all around us, how can you ensure this doesn't happen to you or your business and the hacker walking away with vast amounts of data? It starts with "knowing thy enemy" and that means knowing what types of security threa
Why You Need a Custom Domain Email Address?
So you're ready to start a new online business? You will first need a website and that means having a good domain name. Now tell me, which one of these two sounds more professional to you and which are you more likely to do any business with as a
How to Encrypt an Email to Protect Your Enterprise?
While email has lost its appeal in private online communication somewhat to social media, instant messaging, chat and VoIP, in business communication, it still rules. In fact, according to a Kinsta report, email is the 2nd largest organic content
What is the Safest Way to Send Secure Email Documents?
Once, now a long time ago, if you wanted to send an important document, you would do that through a postal service. Today, the postal service is far from its heyday thanks in large part to email and file-sharing services like Google Docs, Dropbox
IP Spoofing: What is it and How to Prevent it?
In order to commit crimes, cybercriminals rely on a variety of techniques to avoid detection. One such technique is known as Internet Protocol address spoofing, or just IP spoofing. In this article, we'll cover: What is IP spoofing?How does IP
What is ARP Spoofing and How to Prevent it?
ARP spoofing is a type of cyberattack in which the hacker sends out a false Address Resolution Protocol (ARP) message over a Local Area Network (LAN). In this article, we'll take a look at ARP spoofing, or ARP poisoning, what is it, how it works,
How do You Encrypt an Email?
Sensitive information such as usernames and passwords, credit and debit card numbers, social security numbers, medical info, contact information, etc. is very vulnerable when sent via email. This is why it's important to encrypt your email to pro
Email Anonymity and Safety: How to Find the Best Free Anonymous Email Accounts?
Do you need to send sensitive information or files via email? In that case, you should know that email wasn't designed to be private and there are a lot of ways it can be used to identify you, such as: The sender addressIP address lookupReverse e
How to Stay Anonymous Online? Is It Even Possible?
The Internet is an amazing thing when it comes to communication, learning new things, buying stuff, etc. But how about becoming anonymous? Then it's a different story. Tech giants like Google, Amazon, Apple and others don't want you to be anon
All You Need to Know to Create a Secure E Mail
While email has lost some of its appeal as a communication tool over the years and is replaced by other services, having a secure email account is still necessary for a lot of things. You need an email address to sign up to social media networks,
How to be a Whistleblower? Everything You Need to Know About Anonymous Whistleblowing
What would you do if you uncovered corruption, fraud or other illegal practices in your organization, or done by a government agency? Would you stay silent or would you become a whistleblower? If you said the second, this article is the perfec
What is an Email Alias and How to Create One for Your CTemplar Email Account?
What is an email alias and how does it work? An email alias is an additional email address that you can add to your primary email mailbox. Think of it as a nick name to your email account that will use the same account settings, contact list and
What is Internet Surveillance? How to Protect Yourself From Government Surveillance?
Is Big Brother watching you or is it just your paranoia and you're imagining things? Unfortunately, while you may think that you're not interesting enough for someone to spy on you or monitor your online activities - you are and you're being a vi
How to Encrypt Internet Connection and Secure Your Traffic?
Encryption is the process of concealing a message so that it can only be read by the intended and trusted recipient. Or, if you want to get technical about it, encryption means using algorithms to conceal and scramble data into an unrecognizable,
How to Trace Email IP Address and Learn Who Sent You the Email?
Somebody sent you a strange email. Maybe they're threatening to blackmail you if you don't send them a specific amount in ransom, or they claim to know you, but you can't remember knowing them. Their email address, however, reveals nothing. In
How Offline GPG Decryption Software Works?
Whether you have an online business or are looking to secure your own privacy, encryption software is at the forefront and a must-have for protecting your confidential information. In this article, we'll discuss encryption/decryption software, th
Is Email Secure Enough to Send Your Sensitive Documents?
Can you believe that email is 50 years old? And it's still one of the most common ways that we communicate online. In fact, over 300 billion emails were sent and received in 2020 and the average office worker in the United States receives 121 ema
How Does End-to-End Encryption Protect Your Email Data From Third Party Access?
End-to-end encryption (E2EE) provides the best level of privacy for your email communication. But what is end-to-end email encryption? End-to-end encryption is a way of sending data such that only the sender and the recipient can open and read an
How to Improve Online Security and Privacy with Email Aliases?
If you're anything like most people, you're probably receiving dozens of emails per day, making your inbox cluttered. Not only is using only one email address inefficient, but it is also not secure. In this article, we'll show you how to impro
Email Privacy Law: Expectations and Reality
We said time and again that, for all its convenience, email is not private in its nature. But as its user, it's good to know there are still privacy laws that can protect your data while you're using email services. Of course, every country has i
What are the Biggest Points of Email Vulnerability You Must Consider?
Email security threats are growing fast and both individuals and organizations (big and small) are all one wrong step away from phishing, ransomware, malware, or other types of cybersecurity threats. In fact, email itself might just be the weakes
Email Encryption and Human Rights
Earlier in February this year, a criminal group in Europe was arrested for several murders, torture, drug trafficking and other crimes. Among the evidence, the police gathered 44 mobile phones, all equipped with Sky ECC, a Canadian encrypted messagi
Most Important Encryption and Data Privacy Laws Your Business Should Know About
Running a business online means handling lots of confidential information about your company, customers, stakeholders, etc. that must be protected from unauthorized access. Data security has long stopped being a mere buzzword and today businesses mu
What is Autocrypt and Why CTemplar Adopted it
Introducing Autocrypt and What it Means for CTemplar (and Non-CTemplar) Email Users Looking for Security and Privacy? One of the biggest problems end-to-end encrypted email users face is the fact that encryption only works if both the sender and
Is Encryption a Threat to National Security?
The argument whether encryption is a human right or a threat to national security goes back to the early days of the Internet in the 1990s and is still going strong today. We are not as naive as to think that this article alone will once and for
How to Improve Your Company Email Security Hygiene in 2021?
Today, criminals are far less likely to barge into your company doors and take stuff. Instead, they do it behind a laptop, attacking through email. As a business owner, it's important to understand and know how to deal with email attacks, but you
How to Secure Your Email Server Against Attacks?
An unsecured server can be a serious email security problem for your organization and one that can severely damage your reputation with customers. However, keeping the email server secure, whether it's on-premise or on the cloud, is not easy and
Using SPF, DKIM and DMARC to Enhance Email Security
From time to time, hopefully, not too often, you might notice that your receiving mail server has failed to block a malicious email. This has most likely happened because the attacker has used IP or domain spoofing in order to cover their track and
Data Privacy Red Flags Every Business Owner Should Know
According to the Federal Trade Commission (FTC), its Consumer Sentinel Network received 4.7 million reports in 2020. The top 3 reports were: Identity TheftImposter ScamsOnline Shopping and Negative Reviews Among these, the FTC received
How to Analyze Healthcare Data While Preserving Patient Privacy?
Using health data has an enormous positive impact on how healthcare professionals can treat patients, reduce the cost of healthcare, avoid preventable diseases, predict epidemics outcomes and on other aspects of healthcare as well. However, healt
What are the Greatest Threats to Healthcare Data Security?
The healthcare industry is one of the most often targeted by cybercriminals and under threat of data theft. In 2020, the healthcare sector suffered at least one data breach per day as hackers took advantage of the vulnerabilities to gain access to t
Email Dos and Don’ts Lawyers and Law Firms Need to Remember
Lawyers and law firms are not new to sending and receiving emails. However, just like any other profession, attorney services too can often get it wrong. Sending an email to the wrong address, or not ensuring that your messages have a professiona
Email Security: Your Practical Guide to Keeping Your Inbox Safe
We use our email pretty much every day to communicate with others and often to send and receive sensitive information through it, but do you ever consider if this is the safest way to do this for both the sender and the recipient? The truth of th
Computer Security Basics: How to Protect My Computer from Hackers?
Your computer is one of the most valuable things that you own. It allows you to do things and see and talk to people you wouldn't be able to without it and much, much more. But for how much we use our computers, we often forget that we sometimes
Why is Email Privacy More Important Than Ever?
Have you ever considered how much is your free email provider costing you? Wait. What do you mean? It doesn't cost me anything. It's free, you said so yourself. "Well, sorry to break it to you but these email services have to make a living as
Why Choosing an Open Source Secure Email Service over Proprietary Email is a Good Idea
Today more and more organizations opt to go the open source route and email services are among them. Why is that? In this article, we'll explore the benefits that open source offers over proprietary when it comes to email services and also introd
How to Hide Browsing History from ISP and Keep Your Online Activities Hidden?
Not all of your browsing history is something to be proud of. We've all made searches that we would rather keep hush-hush, but how do you do that if your Internet Service Provider (ISP) is tracking all your activity on the web and mobile devices?
Can You Be Tracked if You Use a VPN? Here's how to Find out Who is Ignoring Your Privacy Online!
The idea of a Virtual Network Provider (VPN) is to protect your online privacy and secure your sensitive information. But will a VPN service completely keep your browsing activities from being monitored? Can VPN be tracked? It depends on the VPN
Decrease the Chances of Your Business Getting Hacked by Increasing Email Security Awareness of Your Employees
Did you know that cybercrime costs $6 trillion per year and that an average business loses $4.24 million on average annually due to cyber attacks? For any business, this is a huge amount, but especially for a small business that's only starting a
Best 21 Private Email Providers to Keep Your Online Conversations Safe
The necessity to protect your privacy online is always present and even more so when it comes to email communication. If your email provider is not secure enough to guard your personal data against cyber attackers, it's high time to use an encrypted
Data Privacy Glossary (A-Z)
When it comes to protecting your sensitive personal data, or your organization's data, the different terminology and jargon can often be an issue. This is why we've compiled this A-Z data privacy glossary s in the hopes that it might help you imp
Dos and Don'ts of Data Protection for Your Company
According to a survey of over 1,100 professionals across the world, conducted in 2020 by Experian, despite spending more money and time each year on cyber security, companies are also growing more and more worried about data breaches and cyber-attac
Understanding the Fileless Malware Attacks Surge and how to Protect Against Them
Cyber-criminals and other threat actors will seek (and often find) ways to install malicious files on your computer. However, there is a type of malware attack that doesn't need to do that. The fileless malware attack. What fileless malware do
What is Data Collection?
For a company, few things are as valuable as the data it collects from its customers. Data collection enables companies to better understand their customer's needs, wants and desires. So how do companies collect data? In this article, we'll ex
What are Cookies on My Computer?
While browsing the Internet and visiting websites, you probably encountered a message, usually somewhere at the bottom of the screen, saying: "This website uses cookies to enable essential functionality and to provide Google analytics and a non-p
How to Set up Mail Forwarding
Is your inbox so full of messages that you can't "tell heads from tails"? One thing that can help clear the clutter and make your email a bit easier to use is to set up a forwarding email address. In this article, we'll show you how what is mail
What Ransomware Negotiation Really Looks Like?
Every year, ransomware attacks cost businesses over $133,000 on average. In addition to this, businesses also lose $8,500/hour as a result of the downtime that the ransomware causes. But should you be paying off threat actors what they ask to get
What does BCC Mean in Email and is Blind Carbon Copy Safe?
Did you know that when sending out an email to multiple recipients, you have three options to choose from: ToCCBCC Of these three, you are probably the most familiar with the "To" option. If you leave this field empty, your email message would
Can Opening an Email Get You Hacked?
Did you know that 47.3% of all email is spam, which is around 15 billion spam email messages sent every day? Today it's email security 101 not to download an email attachment or click on a malicious link in a spam message as this can likely lead
How to Avoid Social Engineering Attacks?
When we talk about data security, the emphasis is usually on the more technical dangers such as viruses and malicious software. However, while ensuring that your sensitive data is protected with the latest anti-virus software, there is another we
Video Conferencing Security Best Practices and Apps
The Covid 2019 pandemic has completely changed the way many businesses work. Nowhere is this better seen than in the meteoric rise of video conferencing. Just in the first two months of the start of the Covid 2019 pandemic, the video conferencing
What are the Pros and Cons of Biometric Authentication Technology?
As data breaches happen with more regularity each year and companies lose more money as a result it is becoming clear that protecting your sensitive data with only a password is no longer sufficient. One of the biggest problems when it comes to t
Best Practices and Tips for Digital Security and Privacy for Journalists
As a journalist, your mission is to inform citizens about their society, government, and other things so they can make the best decisions for themselves. Unfortunately, what you'll soon find out (if you haven't already) is that those in power usuall
Pros and Cons of Password Managers (Should You Use a Password Manager?)
How many times did you try to log in to an online account only for your brain to go blank when you needed to fill out the password? An average person in 2020 had 100 passwords, according to a study done by a password manager company NordPass so it's
How to Set Up (and Use) Pretty Good Privacy (PGP)?
When it comes to sending secure and encrypted messages, very few protocols come even close to Pretty Good Privacy or PGP encryption. While PGP encrypt has been around since the 1990s, its use never spread much beyond the privacy-conscious and tec
Email Encryption Market Forecast (2021-2027)
As the need to protect sensitive data increases, so too does the email encryption market grows. We are looking at the global email encryption market by component, by organization size, by development mode, by end user, by regional outlook, industry
Analyzing the Types of Email Services Used in BEC (Business Email Compromise)
In 2020, the FBI's IC3 (Internet Crime Complaint Center) got 19,369 BEC (Business Email Compromise complaints, for an adjusted loss of $1.8 billion. BEC scams are not a new thing and they've been around for a while, but they are getting more soph
Omicron Covid Variant Phishing Email Scam Hits US and UK Schools and Universities
Since the start of the Covid-19 pandemic, the rate of reported cybercrimes has spiked 4X, according to the FBI's Internet Crime Complaint Center (IC3) and threat actors show no signs slowing down. According to the latest ProofPoint report, scamme
Email Scammers Use QR Codes to Bypass Email Security
Cloud email security company Abnormal identified and blocked nearly 200 emails sent to their customers between 15th September and 13th October 2021. These emails were all part of a phishing campaign that used malicious QR codes to steal Microsoft 36
What is Facial Recognition? Should You be Worried About Facial Recognition Security?
Telling a human face is a core social skill and one that we developed throughout our evolution. But not everyone is as good at it which makes facial recognition done by humans spotty at best. In recent years, facial recognition technology has see
What are the Security Risks of Encryption Backdoors That can Affect Your Privacy and Security?
On 29th September, 107 Belgian organizations and cybersecurity experts wrote an open letter to their government calling for it to drop the draft law that would force companies to weaken their end-to-end encryption systems to provide access to law en
Microsoft Edge and OneDrive Syncing Without Warning or Consent
When Google Chrome introduced Sync in 2012, many users saw this as a helpful feature since they could now have their documents available on all their devices at the same time. Soon after, more browsers, including Firefox, Edge, Opera, followed, intr
How an App Tracks Your Location Before and After?
Does this sound familiar? You search for something on your mobile phone. Maybe it's winter coats. You check some shopping websites, maybe even click on some ads. Next thing you know, whatever app you open, there's an ad for winter jackets (or wha
How to Prevent Potential Privacy Breaches Because of Mistakenly Sending of Emails via Cc Instead of Bcc?
It's quite funny how even after so many years of using it, people still make mistakes when it comes to sending emails. One of the most common (and most dangerous) is putting recipients into Cc (Carbon copy) instead of Bcc (Blind carbon copy). Thi
Secure Your Business with CTemplar Enterprise Email Encryption Software
Email communication is a vital tool for businesses, but it is far from secure and can expose an organization's sensitive information and put its data at risk. This is why companies need to secure their data with different security solutions and o
Can Mouse Movements Reveal Your Behavior?
We already know that the browser you're using and how you're using it can reveal a lot about your online behavior through browser fingerprinting, but did you ever consider how much can mouse movements reveal your behavior? According to the comput
Unhealthy Data Harvesting Habits From Health Apps and More Bad Privacy Practices
Consumer data is an invaluable tool for companies to better understand their customers' needs, wants and desires. In fact, all big tech companies engage in some form of data collection and even smaller ones do it. The problem, however, is when
Best Hardware Security Keys for Multi-Factor Authentication
When it comes to securing online accounts, most people don't think beyond a username and password and even then, they re-use their passwords or use weak passwords. Both of these habits are bad security practices as any hacker worth his salt can f
Top 10 Privacy Activists to Follow on Social Media in 2022
You've probably heard the names Edward Snowden and Julian Assange being thrown around in a conversation about Internet privacy and digital surveillance, but those are not the only privacy activists whose names you should know. Here are 10 more pr
Why Augmented Reality is a Privacy Nightmare and What Can You Do to Protect Your Data in it?
One of the biggest news in the tech industry last year was the decision by Facebook to change its name to "Meta". This isn't your normal brand name change, it's much more than that, but first and foremost, it shows which way Facebook wants to go.
Identifying People by Their Browsing Histories (Yes, it's Quite Possible)
Most people don't pay much attention to their web browsing histories (other than sometimes deleting it so that their significant others don't see the sites they visit), but that can be a big mistake. In one of our previous articles, we discussed
When Your Freedom Depends on an App: How Government-Mandated Apps Can be Used for Mass Surveillance
When the coronavirus started to spread around the world, almost the immediate response of many countries has been to enforce the use of Covid-19 tracing apps in their populations. The idea was that this technology would help identify the people w
Surveillance Machines are All Around Us: What Types of Surveillance Equipment are Out There?
It's really difficult these days to take two steps out of your home and not feel the eyes of video surveillance cameras on you. Today, wherever we go, whether in a store, a bank, or even outside in public areas, there is surveillance equipment to mo
Is Your Secure Browser Spying on You? (Which Online Security Tool and Secure Browser are Spying on You?)
As people start thinking more about online security, they realize that Google Chrome is not the only browser in town. Chrome is still (and will likely be for a very long time) the dominant web browser, with 81% of Internet users using it as of De
PHI of 138k individuals Exposed in 3 Email Security Incidents
Personal Health Information (PHI) of a combined 138,000 individuals have been exposed in three separate data breaches at Injured Workers Pharmacy, iRise Florida Spine and Joint Institute and Volunteers of America Southwest California, writes HIPAA J
Zero Day Zimbra Mail Vulnerability Discovered
A new zero-day XSS vulnerability in the Zimbra webmail client, dubbed "Operation EmailThief" was discovered by the incident report company Volexity. According to a blog post, Volexity discovered a series of targeted spear-phishing campaigns last
The Evolution of Phishing Campaigns and How You Can Fight Back
Phishing is not a new phenomenon. In fact, it has been around since 1996. Today, most people are familiar with phishing and what it looks like, so a regular phishing attack isn't much of an issue to most email users. So why is it that hackers are
Governments are Using Secret Spyware. Can You Spot and Stop Hidden Spy Apps?
On 2nd October, 2018, a Saudi journalist, Washington Post columnist and dissident, Jamal Kashoggi was abducted from the Saudi consulate in Istanbul, Turkey by a team of 15 Saudi government agents, strangled and his body dismembered and disposed of.
What is Smishing and How to Protect Against it?
Most people who use email somewhat regularly have heard about phishing and may even have some idea how to protect themselves against it (if you don't here's a good reminder on how to protect from an email-based phishing attack). However, what a l
What is Ransomware-as-a-Service (RaaS Model Explained)
A ransomware attack is one of the better known and most feared online security threats and each year it gets worse. So what is behind this growth of ransomware attacks? Many things, but one in particular - ransomware-as-a-service (RaaS). Wh
What is a Data Leak and How to Handle One?
Losing your data is bad, but having it exposed in a data breach is even worse. The problem is getting worse every year, with more and more data leaks happening and affecting both small and large businesses, without prejudice. Your business could
Google Privacy Sandbox Coming to Android
Although Google's Privacy Sandbox initiative wasn't met with the universal praise that was expected (one Reddit user called it a "consumer-friendly speak for unknowingly opting in to FLoC"), the company seems to like it well enough to bring Privacy
How to Protest Without Sacrificing Your Digital Privacy: A Data Security Guide for Online Activists
On 24th February, Russia attacked Ukraine. On the same day, anti-war protests were held in several Russian cities. These protests were quickly dispersed by the Russian police, arresting around 2,000 people. Of course, the protests didn't end ther
Why Data Security Management is Important for Your Business Continuity?
If you want to understand your customers better and to make better business decisions, you need to collect the right data. However, you also need to be aware of the various data security threats that loom above such as hackers and data breaches a
Your "Right to Privacy": What Do the Constitution and the Law Say?
You've probably heard the phrase "Life, Liberty and the pursuit of Happiness" from the U.S. Declaration of Independence. While not legally binding, this motto is the cornerstone of the United States government and the Constitution. This, of cours
Can Someone Track My Phone Even if I Have Location Tracking Off?
Most people today can't live without a mobile phone in their pocket. Everywhere they go, they absolutely must carry it with them or they will miss the most important phone call of their life or someone will post something monumental on social media.
The Educator's Guide to Student Privacy: How to Protect Student Data?
The notion of what counts as "student data" has changed drastically in the last few years. While before student data referred mostly to the student's name, address, age, demographics, what course they've taken and their final grades, with the spr
What is the Difference Between XSS vs CSRF Attacks and How to Prevent Them?
XSS and CSRF are two of the most common client side attacks. However, they are very different. In this article, we'll take a look at the difference between XSS vs CSRF attacks and what you can do to prevent these two attacks. What is a Client
Security and Privacy in the Metaverse: How to Keep Your Virtual Life Safe?
On 28th October, 2021, Mark Zuckerberg, the CEO of Facebook, introduced a radical change to the biggest social network and his other services at the Connect 2021 conference. That change was the shift from the digital world and social media platfo
How to Detect Stalkerware Apps on Your Mobile Device and Protect From it?
Put down your mobile phone for a moment. Someone might be spying on you as you are using it. In this article, we'll explain how to detect stalkerware on your both Android and iPhone mobile devices and how to protect yourself from it. What is S
What is Cyber Warfare and How is Cyber War Waged?
Despite the current conflict in Ukraine, our modern society sees a lot fewer armed conflicts than 3-4 decades ago for instance. Most countries realize that it's better to "play nice" with others, rather than pull out their guns and risk the lives of
Your Guide to Android Permissions: When to Accept and When to Refuse App Permissions?
Does this message look familiar? Most apps out there will ask for access to some of the features on your phone the first time you open it. This can be location, camera, microphone, photos, phone calls, messages and more. Here's the questio