Take Part in a Study to Help Improve Onion Services

LinuxSecurity.com: I am a postdoc at Princeton University studying computer security and human-computer interaction. My colleagues and I want to understand how Tor users interact with onion services (formerly known as hidden services). The goal of our study is to understand your expectations, assumptions, and habits when browsing onion services. For example, we are wondering: How do you keep track of onion domains?

From: Linux Security

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail

Top 10 Enterprise Encryption Products

LinuxSecurity.com: A decade ago, encryption was hot enterprise security news. As a measure of its effectiveness as a technology, it has been incorporated as a key feature in many security suites since. But that doesn’t mean it has faded in importance. With so many incidents of ransomware, fraud and data breaches in the news, encrypting sensitive data remains a vital necessity.

From: Linux Security

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail

Those Free Stingray-Detector Apps? Yeah, Spies Could Outsmart Them

LinuxSecurity.com: As smartphone users have become more aware that fake cell phone towers, known as IMSI catchers or stingrays, can spy on them, developers have rushed to offer apps that detect when your phone connects to one. Unfortunately, it seems, those tools aren’t as effective as they claim. Watching the watchers turns out to be a complicated business.

From: Linux Security

FacebookTwitterGoogle+LinkedInEvernotePocketGoogle Gmail