Security

Security

Can You Get Hacked From a Google Search?

Apparently you can according to this video from Seytonic. technology, tech, computer, computer science, computers, technology news, tech news, weak web, cybersecurity, cyber security, infosec, info sec, information security, cybersec, hack, hacker, hacked, hacking, google search, google

Read More
Career

the hacker’s roadmap (how to get started in IT in 2023)

This video is from NetworkChuck. Are you wanting to get started in IT in 2023? Do you want to become a Hacker? A Network Engineer? Cloud Engineer? System Administrator? In this video, NetworkChuck will show you the path to getting started in IT and Cybersecurity that will help you reach these goals.

Read More
Privacy

FREE tools to expose who is watching you online!

Who is watching and tracking you? If you are tired of having your private info used just because you did a search online, check out these tools and a brand new way to search the web WHILE maintaining your privacy! and NO. A VPN and deleting your cookies DOES NOT stop you from being tracked!

Read More
Android Google Privacy

Is GrapheneOS the greatest mobile OS of all time?

Google does not have a great reputation around preserving consumer’s privacy. Could GrapheneOS be the answer?

Read More
Privacy

The DARK side of VPNs

It turns out that an overwhelming number of VPNs are actively harvesting and selling your data, capturing passwords / credentials / movements from your web activities, and doing all sorts of awful things. VPNs can be super useful: to help you watch the Netflix catalogue of another country, avoid government surveillance and censorship under oppressive […]

Read More
Networking Privacy Security

You won’t believe how UNSAFE your home router is!

Your router is the gateway between your devices and the internet at large. If it’s compromised, it’s like leaving the front door to your home network wide open, allowing malicious actors to enter. Unfortunately the routers most of us use are VERY insecure, with all kinds of known vulnerabilities. In this video Naomi Brockwell goes […]

Read More
Red Hat Security

Hardening Your Open Source Software

With all the data breaches in the new lately, now may be a good time to learn more about securing your stuff. Emmy is the senior manager for the supply chain group that falls under our product security organization. Her team is focused on securing the systems involved with modifying and storing our offering code. […]

Read More