Counterspy

Passwords: How To Stop Ignoring The Expert Advice

By now you’ve heard endless warnings about the risk of short, trivial passwords. There’s a good chance you ignore them. Let’s talk about why that is and what you can do about it.

To begin with, it really does matter. Easy to guess passwords (12345, pet’s name, kid’s name, birthdate, etc) really do expose you to snooping and identity …

The Snoop In Your Browser: An Alternative

In my last post I said some companies do better than others at scrubbing your confidential search logs as time passes. Google appears to be the worst of the major search engines from a privacy point of view; Ask.com, with AskEraser turned on, is among the best.

But there’s a far better answer than looking for the search company that …

The Snoop In Your Browser

Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life — online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs. But you pay a …

The Case of the Stolen Laptop: How to Encrypt, and Why

There’s an investigator I know, top of her profession, who once put her laptop in the trunk of a cab. By the time she reached her hotel, the laptop was gone. This happens thousands of times a year at airports, train stations, libraries and coffee shops. Sometimes the thief wants your hardware. Sometimes your data turns out to be more …

  1. 1
  2. 2
  3. Next