stories in this tag
7 Alarming Signs That Magecart Attacks Are Here to Stay
Our Product Was so Niche That The Hackathon Misspelled it On Our Prize Certificate: dVPNs
Is Data Privacy Different in The 21st Century?
How to Avoid Becoming a Victim of Data Breach
Top 10 Best Private Encrypted Messengers Designed For Security Nuts
Is Your Social Media Actually Social?
Video Chatting Might Lead You to Identity Theft and Scams
7 Ways To Protect Your Personal Information on the Internet
An Understanding of Available Biometrics
What installing the Messenger app tells us about Facebook
A Vision for a Better Future: The Personal Platform
#The Personal Platform
Organize and Protect Your Online Data
5 Negative Behavioral Effects of Cyber Security on Organization
Enterprise Intranets: How Well Are You Protected?
How to Choose the Right Messenger
Biometrics Can't Be Trusted For Remote Access, Unless You Are A Terminator
State of API Security: API Security Best Practices
Top-6 Best Anonymous Browsers Or Why Privacy Matters
What Exactly Is Browser Security and Why Does It Matter So Much
How to Protect your Business from Any Type of Criminals: The Complete Guide
The Death of Privacy is An Abusive Government's Wet Dream
How to Secure Websites By Monitoring the DNS Records
Even Before Russian Interference, US Election Tech Was Failing
Nine Essential Privacy Settings and Add-ons for Mozilla Firefox
This Year's Top 7 Online Privacy Tools
How To Store Encrypted Data Collected By Your Web Application With PHP7 and LibSodium
VPN Leaks that Threaten Your Online Privacy Daily
Five Crucial Privacy and Security Settings for iOS 13
5 CSRF Vulnerabilities Known For Highest Bounty Rewards
How To Avoid Digital Identity Theft - 6 Steps To Stay Safe
GDPR vs CCPA: Data Privacy On The Lead [Infographic]
#Data Privacy Compliance
Happy Birthday, Internet!
Google Analytics & Privacy: Why Does it Matter?
#Open Source Software
How Worthwhile Is It to Use a Password Management System
Posting Videos of Your Kids on YouTube Is Weird
Strong Customer Authentication (SCA): The True Cost Might Shock You
#Strong Customer Authentication
Research Suggests That a Hard Brexit Could Lead to Significant Confusion within the UK Cloud Market
Compliance is Not a Guarantee Against Data Breach
#Data Privacy Compliance
A Sweater of Safety Wrapped Around My Internet Connection
Why Using a VPN is the Best Way to Protect Your Personal Data When Surfing the Web
How You Can Protect Your Online Privacy: Easy Steps for Daily Activities
Why Privacy Matters And How To Stop Online Harassment
Bitcoin is the bastion of Freedom Tech
#Bitcoin Vs Government
What is Alternative Mobility? And Why Digital Identity Is Crucial For Its Future
There is No More Encryption Debate: Backdoors Threaten the Whole World
[Mythbusting] How to Choose the Right VPN Service?
Your Data is the DNA of Artificial Intelligence
[Interview] Decentralization and Privacy in Telecommunications
Data Breaches: No Longer Delivering Punches to Business Reputation?
Why You Should Be Using a VPN in 2019 ?
#Virtual Private Network
Privacy: What You Need To Know
Flame: The Most Sophisticated Cyber Espionage Tool Ever Made
On the Instagram API changes
The evolution of VPNs: from business security to privacy protection
Is this an Ubuntu-based Botnet deploying Tor Relays and Bridges?
The Inherent Value Of Private Information
Welcome to the Private Party!
State Controlled Internet: The Story About VPNs in China
Introducing Wibson, a decentralized data marketplace empowering individuals to monetize their own…
What is Secure Multi Party Computation?
Some Tor Relays, you might want to avoid.
Avoiding consumer lock-in with the decentralised web
The Arweave Project
Delivering Practical Privacy in Blockchain and DLT Applications
Hunting with ꓘamerka 2.0 aka FIST (Flickr, Instagram, Shodan, Twitter)
Secure Your Emails in 5 Minutes Using PGP
IronHide: Better Team Encryption
Remembering 2018’s Most Prominent Data Breaches
What is the Best Free Privacy Software?
#Best Privacy Software
Christian Stewart ✔️
Dark Web Shrinking At A Fast Pace, Just 15% Tor Sites Online
GDPR and Self-Sovereign Identity: What Lies Ahead
#Self Sovereign Identity
How Policy Leaders Can Democratize Data Ethics
Cryptocurrency Exchange: A DEX Offering The Complete Solution
Privacy Is Dead, And We Have Killed It
Independent audits, a new transparency practice in the VPN industry
There ain’t no such thing as a free service, and why I’m giving up Facebook in 2019.
How Browsers Help Us Lose Privacy (New Tricks)
The Benefits of Proxy Servers for Businesses
How to Track Someone Using Their Smartphone
Immutability is a Double-Edged Sword: Blockchain and Data Privacy
5 Reasons I Switched From Bitcoin To Dash
Leah Stella Stephens
Inadequate Smartphone Security as Second-Hand Smoke
A Beginner’s Guide to Personal Privacy Online
Domain Fronting in a nutshell
VPN vs Antivirus: Which is a Bigger Cyber Security Market and Which Does Your Company Need?
We Gave Privacy Policies an AI Overhaul, and You’ll Never Have to Read Them Again!
Understanding Blockchain Private Data. A Hands-on Example
Digital Trends’ “Tech for Good” Campaign Took Center Stage During SXSW
A Decentralised Blockchain-Based VPN Network Could Be The Future of Private Communication
Big Tech’s User Data Violations
6 Tips for Choosing the Right VPN for Personal Use
What VPN services aren’t telling you about data logging
The Good News From The CIA Hacks
President Trump’s Advisors are Wrong About Encryption
Why is Facebook Releasing the White Paper for their ‘Blockchain’ project Libra Now?
So You Want to Leave Facebook
Can the Free Market Save Privacy?
Facial Recognition Tech Raises Some Real Ethical Dilemmas
Why new social network Voice might not be a better answer to Facebook
We are all Digital Slaves
The Stablecoin you decide to spend will determine how future banking unfolds
Hackernoon Newsletter curates great stories by real tech professionals
Get solid gold sent to your inbox. Every week!
Topics of interest
Best of Where to buy Bitcoins