Category: Secure Surfing

CyberGhostIf you get caught using a VPN (Virtual Private Network) in Abu Dhabi, Dubai and the broader of United Arab Emirates (UAE), you could face temporary imprisonment and fines of up to $545,000 (~Dhs2 Million). Yes, you heard that right.

Online Privacy is one of the biggest challenges in today’s interconnected world. The governments across the world have been found to be using the Internet to track people’s information and conduct mass surveillance. Here VPNs and proxy servers come into Play.

VPNs and proxy servers are being used by many digital activists and protesters, who are living under the most oppressive regimes, to protect their online activity from prying eyes.

However, using VPN or proxy in the UAE could land you into great difficulty

Read more at
http://thehackernews.com/2016/07/vpn-is-illegal-in-uae.html

 

Riffle-Online-Anonymous-Proxy-ToolOnline privacy is an Internet buzzword nowadays. If you are also concerned about the privacy of your web surfing, the most efficient way is to use TOR – a free software that lets users communicate anonymously by hiding their actual location from snoopers. Although TOR is a great anonymous network, it has some limitations that could still allow a motivated hacker to compromise the anonymity of legions of users, including dark web criminals as well as privacy-minded innocents. Moreover, TOR (The Onion Network) has likely been targeted by the FBI to arrest criminals, including the alleged Silk Road 2 lieutenant Brian Richard Farrell, who was arrested in January 2014. Even the TOR Project accused the FBI of paying the researchers of Carnegie Mellon University (CMU) at least $1 Million to disclose a technique that could help the agency unmask TOR users and reveal their IP addresses as part of a criminal investigation. So, what’s next? Is there an alternative?
Well, most probably, YES.

Read more at
http://thehackernews.com/2016/07/riffle-anonymous-proxy.html

Protecting-WiFi

Wireless Networking (Wi-Fi) has made it very convenient for anyone to access the Internet via a computer, mobile phone, tablet, or other wireless device anywhere within range of a network’s signal. Every day thousands of people purchase a wireless router and attach it to their home networks. Most wireless routers are shipped with a default network name, default username and password, and no security settings enabled. This allows almost anyone to configure and setup their network within a matter of minutes. However, before connecting to the wireless network, the wireless router needs to be made as secure as possible to prevent unauthorized access.

Read more at
http://bit.ly/1SYSVOo

cfa8c851-83d4-42df-9adb-3d388cef005e

The federal government will lean heavily on the private sector to help it deliver its long-awaited national cyber security policy and initiatives like voluntary infosec health checks for businesses and joint threat sharing centres in capital cities. iTnews can exclusively reveal the policy, which is expected to be released in the coming weeks, will contain five key pillars intended to help Australia grow by embracing disruptive technologies from a secure footing in all areas of the economy. The 46-page strategy, sighted by iTnews, is the first update to Australia’s national cyber security policy since 2009. Businesses and government agencies have been awaiting the updated document since late 2014, when then-PM Tony Abbott announced a review of the ageing strategy.

Read more at
http://www.itnews.com.au/news/revealed-australias-new-cyber-security-strategy-418000

FBI-Director-tape-over-webcamWhat do you do to protect your ‘Privacy‘ while using your computer? FBI Director James Comey uses tape to cover up his laptop webcam to ensure Privacy.
Yes, you heard it right. During the Q&A session at Kenyon College last week, Comey said that he uses tape to cover his laptop webcam in order to mitigate the danger of secret surveillance.
While giving a speech about encryption and privacy, Comey repeated his argument that “absolute privacy” hampers the law enforcement and has never existed in America – until now, when by default encryption offered by big tech giants created boundaries where law enforcement can’t enter, even with a court order.This isn’t the first time Comey made this kind of statement. Comey has always suggested tech companies to adopt encryption techniques that help federal agencies intercept end-to-end encrypted communications when necessary.

Read more at
http://thehackernews.com/2016/04/tape-webcam.html