The above picture is often used to illustrate how VPNs can protect your privacy. Because the VPN creates an encrypted tunnel between you and the Internet, your privacy is protected. However, the picture is missing a very important piece: the VPN service provider. As you can see, the encrypted tunnel ends at the VPN service […]Continue Reading... No Comments.
Recently, two unsecured databases were discovered on the Internet. Exactis, a Florida marketing data aggregator, exposed 340 Million Consumer Records to the world. Another company, Telemedicine, exposed detailed health care information on more than 2.3 million patients in Mexico, by making a MongoDB database accessible to anyone without a password. In both cases, the researchers […]Continue Reading... No Comments.
You’ve had the experience. You looked at something on a shopping site, then that thing follows you all around the Internet. It feels creepy. Trust me, those companies take privacy very seriously – their privacy. You see, you looked at the pair of shoes you later bought. The shopping site knew that you looked at […]Continue Reading... No Comments.
People don’t like to be tracked around everywhere they go on the web. So all major browsers give you the option to “block third party cookies”. And there’s a DNT header that your browser sends on your behalf to nicely tell the tracking parties that you don’t want to be tracked. However, the big question […]Continue Reading... 1 Comment.
And letting others spy on you? Smart TVs, security cameras, smart thermostats, smart plugs, smart doorbells, Alexa Echo, Google Home. All of these are capable of collecting data from your home (network traffic, connected devices, shared files, image, voice, video, etc.), and capable of sending data out to anywhere over the Internet, uninhibited. Earlier this […]Continue Reading... No Comments.
You’ve probably heard of Pi-hole, an open source software package that runs on a Raspberry Pi and blocks ads on any device connected to your network. It’s efficient and cost effective, but requires you to have some technology know-how. This is a detailed write-up if you are interested in setting up Pi-hole by yourself: Install […]Continue Reading... 4 Comments.
Today’s smart TVs collect a lot of information about you beyond your knowledge, sometimes without your consent. Last year, Vizio was fined $2.2 million for collecting user data wihout properly informing consumers. From FTC official statement: VIZIO smart TVs … capture second-by-second information about video displayed on the smart TV, including video from consumer cable, […]Continue Reading... No Comments.
There’s a new trick to send spam: using legitimate business email services. Just a few days ago, I received an email from Honeywell. It was spam. I checked the sender address and the sending domain. It seemed to be sent from Honeywell indeed. So I wondered why Honeywell would spam me with something that’s completely […]Continue Reading... No Comments.
To mitigate the risks of IoT devices on your home network, Steve Gibson, the creator of ShieldsUP!, proposed a “Three Dumb Router” configuration to isolate the insecure IoT devices from your normal LAN, where the more valuable and more secure devices such as PCs and NAS storage reside. Since the devices stay in their own […]Continue Reading... No Comments.
Ars Technica reported today that the VPNFilter malware targets a much larger number of devices than previously thought (200,000 additional routers were added to the initial estimate of 500,000). And it is more powerful than revealed in original analysis. VPNFilter’s elaborate design involves three stages. Stage 1 acts as a backdoor that uses a sophisticated […]Continue Reading... No Comments.