Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more There’s a good chance you were affected by the Equifax hack of 143 million nam...read more

New anti-facial recognition glasses protect users’ privacy from CCTV cameras

Facial recognition technology is being widely used, so it was about time when anti-facial recognition tech would come up with an inexpensive solution. Yes, the solution in the discussion is sunglasses and eyewear known as “Reflectacles” developed to prote...

What’s it like really when a city is in lockdown ?

Much as we’d all like to believe that it’s going to be a year of perfect weather, perfect political harmony, and perfect love of our fellow man throughout the world, all of which are worthy ideals, current events and history itself tell us otherwise. There...

Checkmate to danger: here’s how to always win!

Have you ever thought how reading your emails in a public place reduces your chances to react and de...

How to flag and tag your home for FEMA

“We are from the government and we are here to help you!” – these words inspire distrust in ma...

Castle defense Strategies

Whether it’s a random act of crime today or one which might come in a more degraded societal scene...

German Researchers Show How ‘Anonymous’ Browsing Data Can Easily Be Exposed

A judge’s porn preferences and the medication used by a German MP were among personal data un...

10 Signs You Might Be a Victim of Identity Theft

Identity theft is the fastest growing crime in the country, according to the credit bureau TransUn...

The good & bad of social networking apps

Have you ever thought how much your life has changed over the last few years? Whether we accept this...

Protect yourself from Cyber Espionage: cyber security tips and techniques

Think of espionage with characters like James Bond, whereby you have to disguise yourself and to tra...

The creation and tools of a new Cyber Command

The Gov is finalizing plans to revamp the nation’s military command for defensive and offensive cy...