How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across the internet but how do they do that? This...
Credit Freeze Part #2
Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will...
Credit Freeze Part#1
Brief explanation so were all on the same page.
When you barrow money for different items in your life...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across the internet but how do they do that? This...
Best Secure Messaging App
Brief explanation so were all on the same page.
Every day in our modern society people communicate using...
Item Tracker Tags
We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point...
Protect Yourself From Fraud
Are you doing everything you can to not be a victim of fraud?...
Protect Yourself From Fraud
Are you doing everything you can to not be a victim of fraud? Check over our quick list to be sure.
How Hackers Hack Your Accounts Password & Ways To Avoid Being Hacked
Do you know how hackers get people's information? This article will educate you on the most used methods...
16 Ways You May Be Exposing Yourself to Fraud
If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity...
9 Tips for Safer Online Income Tax Filing
If you think filing your taxes is a nuisance now, imagine doing it after a scammer steals your identity...
4 Investment Scams
The variety of investment scams out there is limited only by the imagination of the con artists who create...
How to Avoid Unwanted Photos on Social Media
If you spot an unwanted photo of you on your News Feed, there are things you can do
A 73-year-old lured her perspective scammer to her house and had him arrested
A 73-year-old knew she was being scammed. So she lured the scammer to her home and had him arrested,...
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries
David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than...
A Hacker Shares His Biggest Fears
A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley...
Does Homeowners Insurance Cover Theft And Break-Ins?
Some types of insurances cover theft and Breakins. In this article Allstate talks about the different...
Rental car ripoffs
Three cars, three teams wearing hidden cameras, and one car rental company location with a long history...
Locksmith ripoffs: Hidden camera investigation
Who do you call when you're locked out of your home? A locksmith. But industry experts tell us some of...
How Your Cell Phone Spies on You.
Edward Snowden goes on Joe Rogan's Podcast to talk about technology and privacy.
It's this SHOCKINGLY Easy to Steal a Car!?
Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft...
How hackers could use smart home devices to spy on you (Marketplace)
Are Your Security Cameras Spying on you? Watch this shocking video investigation.
Hacking Police Body Cameras
Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a...
Former NSA Hacker Reveals 5 Ways To Protect Yourself Online
In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting...
Is Your Car Safe From Hackers?
An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996...
Privacy and smartphone apps: What data your phone may be giving away (CBC Marketplace)
Your apps you could be giving companies permission to track your location, read all your texts, access...
Synthetic Identity Fraud: A New Kind of Costly ID Theft You’ve Never Heard Of
Do you know what Synthetic Identity Fraud is? How do you make sure your not a victim of it?
Georgia Family Says Nanny Found on Care.com Stole Their Identities
Do you know who is watching your kids and who is left alone in your house? This family thought they knew...
North Coast insurance agents on protecting home, finances from fire
It doesn't matter that the State Farm agent in Lower Lake, a 35-year veteran of the industry, has been...
Car Hackers cause massive vehicle recall
Recent news of cars being hacked has caused a massive recall of 1.4 million vehicles. But the debate...
In Cyber Security, All Eyes on Car Hacking
As cars have gotten more and more computerized they have greatly improved, but they have also sadly become...
Blues plans will offer free, perpetual credit and fraud protection
Blue Cross and Blue Shield plans, reacting to a series of massive cyberattacks that exposed millions...
Moving company scams: What you need to know.
If you are planning to move what should you be on the look out for?
Top hacker shows us how it's done
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and...
I got hacked by an iPhone Cable.
You think you're hiding your location. You use a VPN. You turn...
I got hacked by an iPhone Cable.
You think you're hiding your location. You use a VPN. You turn off location permissions, and still Big...
Item Tracker Tags
We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point...
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries
David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than...
Who's Spying on Your Phone in 2020? (Part 1)
This is intended to be a multipart series on who's spying on your phone. There are multiple parties spying...
How Big Tech Finds Your Exact Location -- Even When You're Hiding It
You think you're hiding your location. You use a VPN. You turn off location permissions, and still Big...
Big Tech is Targeting You
Big Tech is collecting information on your every thought. Google has created belief maps that can actually...
We have Been Chipped and Nobody Cares. - 2022
You think you're hiding your location. You use a VPN. You turn off location permissions, and still Big...
How Your Phone Works! Tech Secrets
How does a mobile phone work? What is the technology involved? Why do some phones not work for some carriers?...
Time to De-Google! Best Privacy Phone?
2022 is coming and it's time to reassess the best phone choice for this coming year. The winner is the...
Two Factor Authentication is a Big Tech Scam! You Must Resist!
You think you're hiding your location. You use a VPN. You turn off location permissions, and still Big...
Google Watches ALL Your Devices! How to Stop It.
You may think you're protecting a computer with a VPN, Location turned off and various privacy strategies,...
Is Linux Ready for Primetime? Desktop Distro Shootout!
Using a Virtual Machine, we will test out 9 Linux Distros and see how they fare with user friendliness...
Switch to Linux? The Real Privacy OS
Should you Switch to Linux? We will discuss how Linux is made and how its organization actually influences...
Vax Card Checks in Restaurants are Truly Zucked Up!
This is NOT an Anti-Vax video. Vaccination Card Checks at restaurants here in Los Angeles truly a zucked...
Windows 11. A Privacy Review
Let's do a deep dive on the elements of Windows 11 that impact on privacy. We'll discuss Microsoft ID,...
Apple M1 Hype vs Privacy - Which Wins?
I was faced with the decision of buying an Apple Macbook with an M1 chip but had to balance it against...
A Hacker Shares His Biggest Fears
A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley...
How many Spy Cameras are Recording you right now?
Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your...
A New Phone Spy Tool? The IMU
Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit...
Defending Your Privacy with Disinformation - Top 3 Tips
Defensive disinformation is a great tool against the data mining activities of governments and the big...
How to do End-to-End Encryption without an App (Intro to GPG)
Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about...
How Device Fingerprinting Reveals Your Real Identity
What is device fingerprinting? How is it different from browser fingerprinting? How can this be used...
Is Protonmail Safe for Security and Privacy?
Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails...
Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?
There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)...
Perimeter Radar Alarm Electronics Project for Intrusion Detection
This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry...
Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy
This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big...
My Dope Advanced Home Network Setup for Privacy and Security!
I'll be describing a unique advanced network setup for a home that has convenient privacy and security...
Why You Have No Privacy, and How to Get It Back. (Mostly.)
Big tech is constantly building a profile on you using many different sources. At a certain number of...
Mysterious Binary Blobs that make your Phone Unsafe
What are these binary blobs that make your phone unsafe? Find out some real dangers with proprietary...
Can LInux Phones Succeed?
The critics are out and some people are saying that Linux phones have no chance of gaining traction....
Most Secure, Private and Usable Linux Distro
Discussing the different Linux distros that are focused on security and privacy but can be used as a...
How Holidays Ruined My Internet Privacy (and how I fixed it)
The Holiday season is starting once again and this reminds me of how my family ruins my privacy each...
My New GNU/Linux Phone is Coming Soon! (Pinephone)
I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in...
Privacy. That's NOT iPhone!
Apple released a new ad program that has the headline 'Privacy. That's Iphone'. We will debunk this...
Review of a Made for Linux Ultrabook - Star Labtop Mk III
Full review of a Made for Linux Latop - the Star Labtop Mk III from StarLabs Systems. This is an ultrabook...
Is loading the Android Custom ROM - LineageOS Safe for Privacy?
Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source...
5 Ways Tech Crimes are Getting Creepier
As the world gets more and more advanced criminals exploiting technology to victimize people becomes...
5 Ways Tech Crimes are Getting Creepier
As the world gets more and more advanced criminals exploiting technology to victimize people becomes...
Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter)
What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when...
How Your Cell Phone Spies on You.
Edward Snowden goes on Joe Rogan's Podcast to talk about technology and privacy.
How to Install GNU/Linux UBPorts Ubuntu Touch on Oneplus One (and Nexus 5)
Here's a guide to installing Ubuntu Touch from UBports, a GNU/Linux mobile platform forked from the original...
Why wait till 2020 to get a GNU/Linux Phone? You can get one today!
Do you have to wait until 2020 to get a GNU/Linux Phone? Are you waiting on the Librem 5 or the Pinephone....
Comparing Linux Phones: Librem 5 and Pinephone
Comparing the Librem 5 vs Pinephone specifications. Also a comparison against an iPhone. Discussion of...
Is Encrypted DNS Good for Privacy?
New changes coming to the Internet! Google about to start Encrypted DNS, or DNS over HTTPS (DoH), or...
Backdoor to your Phone - Part 2
Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control...
Backdoor to your Phone - Part 1
Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control...
Setting Up Your New Computer Safely
Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques...
It's this SHOCKINGLY Easy to Steal a Car!?
Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft...
5 Cybercrimes That Scored Millions and Got Away with It
We are not trying to glorify any criminal act. But it is important to talk about them so people can learn...
Stealing Data Over Open WiFi
The data goes... through, the pineapple? *zooms in super-tight on face* *then zooms in super-tight on...
USB Drive That Steals Files
Computer and technology crimes are wrong and we do not encourage them. But it is important to know what...
Hacking Police Body Cameras
Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a...
Former NSA Hacker Reveals 5 Ways To Protect Yourself Online
In a time where companies, celebrities, and even governments are coming under cyber-attacks, getting...
Using Credit Card Skimmers
What are Credit Card Skimmers and how do they work? What can you do to be less likely to be a victim?
Is Your Car Safe From Hackers?
An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996...
Why People Still Fall for the Nigerian Email Scam
Brian stumbled onto the perfect get-rich-quick scheme! Then some men in suits showed up, and this informative...
Detecting a Wire and Hidden Spy Cams
Jason started getting really paranoid so we all unanimously decided to do an episode about detecting...
Hacking With SQL Injection Attacks (and Where to Practice Them Safely)
What is an SQL Injection and could your IT Department be vulnerable to it?
Top hacker shows us how it's done
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and...
Privacy
Item Tracker Tags
We all loose things in our busy modern day lives. Maybe some of us have things stolen from us. The point...
Teenager Hacker takes control of more than 20 Tesla vehicles in 10 countries
David Colombo, 19, found vulnerabilities in a third-party software that let him take over more than...
Who's Spying on Your Phone in 2020? (Part 1)
This is intended to be a multipart series on who's spying on your phone. There are multiple parties spying...
A Hacker Shares His Biggest Fears
A white hat hacker, with over 30 years of experience as a cybersecurity analyst at a major Silicon Valley...
How many Spy Cameras are Recording you right now?
Spy Cameras are getting smaller and harder to detect each year. Do you know what to look for so your...
A New Phone Spy Tool? The IMU
Here comes a new tracking device once again misused for evil purposes. The Inertial Measurement Unit...
Defending Your Privacy with Disinformation - Top 3 Tips
Defensive disinformation is a great tool against the data mining activities of governments and the big...
How to do End-to-End Encryption without an App (Intro to GPG)
Can you do end-to-end encryption without an app like Signal or Whatsapp? This video will teach you about...
How Device Fingerprinting Reveals Your Real Identity
What is device fingerprinting? How is it different from browser fingerprinting? How can this be used...
Is Protonmail Safe for Security and Privacy?
Is Protonmail a safe email platform for security and privacy?
This video explains the risks of emails...
Linux Phone vs. De-Googled Android AOSP - Which is better for Privacy?
There are two options to get some privacy when using mobile phones. These are Linux Phones and AOSP (De-Googled)...
Perimeter Radar Alarm Electronics Project for Intrusion Detection
This project involved making a Pi-Hat with Microwave Radar, which is meant to be used with a Raspberry...
Creating a Disinformation Plan/OPSEC to Protect Your Security and Privacy
This video is about managing DISINFORMATION for your benefit. Are you a YouTube creator? Are you big...
My Dope Advanced Home Network Setup for Privacy and Security!
I'll be describing a unique advanced network setup for a home that has convenient privacy and security...
Can LInux Phones Succeed?
The critics are out and some people are saying that Linux phones have no chance of gaining traction....
Most Secure, Private and Usable Linux Distro
Discussing the different Linux distros that are focused on security and privacy but can be used as a...
How Holidays Ruined My Internet Privacy (and how I fixed it)
The Holiday season is starting once again and this reminds me of how my family ruins my privacy each...
My New GNU/Linux Phone is Coming Soon! (Pinephone)
I just ordered my Pinephone from Pine64. This is the Braveheart edition and it is slated to arrive in...
Privacy. That's NOT iPhone!
Apple released a new ad program that has the headline 'Privacy. That's Iphone'. We will debunk this...
Is loading the Android Custom ROM - LineageOS Safe for Privacy?
Is it a good idea to change your Android phone to LineageOS (a custom ROM build over Android Open Source...
Best Privacy Focused Laptops (Linux) in 2019 (4th Quarter)
What are the best laptops in late 2019 with a privacy focus? These are hard to find and especially when...
How Your Cell Phone Spies on You.
Edward Snowden goes on Joe Rogan's Podcast to talk about technology and privacy.
Backdoor to your Phone - Part 2
Your phone is vulnerable. There are 4 backdoors that you cannot defend against. All under the control...
Setting Up Your New Computer Safely
Learn how to setup up your brand new computer safely to prevent malware and viruses. These techniques...
It's this SHOCKINGLY Easy to Steal a Car!?
Prepare to be shocked by just how easily your pride and joy can be stolen by a relay attack! Car theft...
Hacking Police Body Cameras
Security researcher Josh Mitchell has found numerous law enforcement body cameras are vulnerable to a...
Is Your Car Safe From Hackers?
An Israeli Cyber Security company says they can hack a moving car, and worse, every car made after 1996...
Top hacker shows us how it's done
You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across the internet but how do they do that? This...
Credit Freeze Part #2
Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will...
Credit Freeze Part#1
Brief explanation so were all on the same page.
When you barrow money for different items in your life...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across...
How Does Google And FaceBook Track Every Click You Make Across The Internet?
You have heard that Google and Facebook can track you across the internet but how do they do that? This...
Credit Freeze Part #2
Part #2 in our Credit Freeze series. This series of articles was written by our staff writers. It will...
Credit Freeze Part#1
Brief explanation so were all on the same page.
When you barrow money for different items in your life...