Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • How to keep your messages private and anonymous

    How to keep your messages private and anonymous

    Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...

    Lexie 01.02.2016 6 mins
  • Tails 2.0 installation and review

    Tails 2.0 installation and review

    This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...

    Lexie 25.01.2016 4 mins
  • Six big data security predictions for 2016

    Six big data security predictions for 2016

    2015 was full of newsworthy cybersecurity breaches. Hackers revealed the names and credit card details of 33 million people who frequented the online-cheating website Ashley Madison. Researchers demon...

    Lexie 20.01.2016 8 mins
  • What would you give for free Wi-Fi? Probably more than you think

    What would you give for free Wi-Fi? Probably more than you think

    This post was originally published on January 13, 2016. What’s awesomer than free public Wi-Fi? When you find a free public Wi-Fi hotspot you probably think, “Awesome!” and connect to it without...

    Lexie 13.01.2016 9 mins
  • Use a VPN and save up to 50% on car rentals. We tried it!

    Use a VPN and save up to 50% on car rentals. We tried it!

    This post was originally published on November 25, 2015. Frequent flyer? You can also use ExpressVPN to find cheaper airline tickets! When booking cars online, some car rental companies and price comp...

    Lexie 25.11.2015 3 mins
  • How Flash is used to destroy your computer

    How Flash is used to destroy your computer

    Some of the most common Web viruses are ones that affect your computer by tricking you into clicking on a specific website. In fact, a whole industry exists where hackers simply upload their software ...

    Lexie 13.11.2015 2 mins
  • Come to the dark web… it's a little safer now

    Come to the dark web… it's a little safer now

    The dark web has long been seen as the skeevy underbelly of the Internet where users can buy illegal drugs, steal people’s credit card information, and hire someone to “off” their neighbor. In r...

    Lexie 22.09.2015 2 mins
  • Hacktivism and vandalism were the main motivations for DDoS attacks last year

    Hacktivism and vandalism were the main motivations for DDoS attacks last year

    Distributed denial of service (DDoS) attacks are growing in size, frequency and complexity, according to the latest Annual Infrastructure Report from Arbor Networks. The security vendor’s 10th Annu...

    Lexie 18.02.2015 3 mins
  • No Wi-Fi, no problem: Hackers go low-tech to steal your data

    No Wi-Fi, no problem: Hackers go low-tech to steal your data

    This article was originally published on January 22, 2015. The risks of using an unprotected, unencrypted Wi-Fi network are well-documented. Anything you transmit becomes fair game for hackers — if ...

    Lexie 22.01.2015 3 mins
  • Internet Systems Consortium site hacked

    Internet Systems Consortium site hacked

    This post was originally published on January 7, 2015. This week the Internet Systems Consortium site was hacked. Visitors to the site, which develops the BIND DNS, OpenReg, ISC AFTR and ISC DHCP t...

    Lexie 07.01.2015 2 mins
Get Started