Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more There’s a good chance you were affected by the Equifax hack of 143 million nam...read more

Why you should be using a password manager

Every few weeks, we hear the news that another major website has been hacked. Often these hacks mean your personal information has also been compromised. In this post, we cover the important reasons for why you should use a password manager to protect your on...

How to Invent a Person Online

Is it possible to be truly anonymous in the digital world? Here is an example of one Aaron Brown who did. On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio. Inside was a blank thank-you note and an Ohio stat...

Constant vigilance is the key to protection from phishing and cyber crime

Alan Phillips is a security expert and quoted extensively in an article in the Financial Times as pa...

8 Tips to Secure Your Cloud Data

No more having to bring your thumb drives or portable hard disks along wherever you go because cloud...

The Extreme Measures One Man Took To Learn About Online Tracking

Aaron Brown has scruffy brown hair, a thin mustache-goatee combo, and one of those mouths that rest...

SyncCrypt Ransomware Hides Inside JPG Files, Appends .KK Extension

A new ransomware called SyncCrypt was discovered this week by Emsisoft security researcher xXToffe...

6 Ways to Protect Yourself from future Hacks

There’s a good chance you were affected by the Equifax hack of 143 million names, corporations, re...

Security camera mapping system launches in Albuquerque, N.M.

Albuquerque, N.M. — The city and 2nd Judicial District Attorney’s Office announced the creatio...

How covert agents infiltrate the internet to manipulate, deceive, and destroy reputations

One of the many pressing stories that remains to be told from the Snowden archive is how western int...