Search

Terra Privacy Blog

Public Wifi Warning: Emails and Passwords Visible Even with VPN

Warning: Phones can openly transmit emails and passwords — even with VPNs installed. Why does this happen? What can you do to fix it?

Continue reading “Public Wifi Warning: Emails and Passwords Visible Even with VPN”

Viruses vs. Trojans

Which are more common: viruses or trojans?  The answer might surprise you.

Continue reading “Viruses vs. Trojans”

Burlington Electric Malware vs. Hacker Deterrent

Would Hacker Deterrent have blocked the malware recently found on a Burlington Electric laptop?

Continue reading “Burlington Electric Malware vs. Hacker Deterrent”

Hacker Deterrent 2.1 Beta

Hacker Deterrent 2.1 Beta is available now for Windows 7 & 8.  The Windows 10 beta version will be available January 15.  This release offers seven new powerful features:

Continue reading “Hacker Deterrent 2.1 Beta”

Hacker Deterrent: Version 2.0

We are pleased to announce the launch of Hacker Deterrent 2.0.

Continue reading “Hacker Deterrent: Version 2.0”

#1 Hacking Method of 2016

The Verizon Data Breach Report for 2016 is out.  So what was the number one hacking method of 2016?  And how can you protect yourself from it?

Continue reading “#1 Hacking Method of 2016”

Email Security & Privacy

Two recent Yahoo incidents raise serious concerns over email security and privacy:

  • Over 500 million Yahoo email accounts were recently hacked. (NBC News)
  • The US Govt installed a “” backdoor into Yahoo email servers. (The Intercept)

According to a recent Pew Research survey, most Americans (69%) don’t trust their government to be able to keep their personal information safe and secure.  The concern of the majority has already come to pass:

“The program that was installed for interception was very carelessly implemented, in a way that if someone like an outside hacker got control of it, they could have basically read everyone’s Yahoo mail” — “Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email” (The Intercept)

With the major email providers offering little security and even less privacy, what can you do to take email security and privacy back into your own hands?

Continue reading “Email Security & Privacy”

Key To It All

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers).  C2 Centers are the very heart of the hacker’s operation.  Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center.  Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.

Even though C2 Centers are the very heart of the hacker’s operation, half of the security experts at large companies aren’t familiar with them.  This lack of knowledge results in tragic consequences.  For the golden key to stopping hackers is to sever their malware’s connection to the C2 Center.  The moment you do so, the hacker’s entire operation falls apart.

Continue reading “Key To It All”

Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys?  It’s actually that shockingly easy, provided you know which two keys to press and when.

Continue reading “Shockingly Easy To Break Windows 10 Encryption”

Blog at WordPress.com.

Up ↑