Yahoo yesterday announced that Yahoo mail has been hacked and that at this time it has confirmed a number of users e-mail accounts have been compromised – you may be one of them (and if you are see...
Encryption tools help people keep secrets. Bram Cohen has a more subtle ambition: he wants to help people keep secret the act of keeping secrets. For the last year Cohen, who created the...
The first of the year is a good time for many things, one of which is changing passwords. Most people hate the idea of changing passwords, but it is a necessary evil. The proliferation of key loggers...
According to this document, Apple claims that it can sync passwords across various devices from the company without storing these passwords in the Cloud. If this is true, Apple's latest application...
The function of TorSearch is to act like a bot and traverse the sites that are normally on the Tor network. These sites can’t be reached through proper channels. The venture was begun by Chris...
Tor which stands for “The Onion Router” is a cool way of remaining incognito while online. It is a tool used by journalists, dissidents and activists. Unfortunately the anonymity it affords the right...
The law and lawmakers are sometimes involved in some very dubious activities. It almost makes one think that they serve the criminals they’re supposed to fight more than the decent law-abiding...