John McAfee is making an unhackable phone. http://google.com/newsstand/s/CBIw7O-x7jQ
Linux CLI Launcher Transforms Your Home Screen Into A Terminal
- Use two-factor authentication. Many sites and apps (most email services, social networks and banks) offer two-factor authentication when logging in. Basically, you get a token (in the form of a numeric pass code sent to your phone or email) that proves it’s really you logging in. Using two-factor authentication makes it harder for hackers to steal your login information when you access the internet on an open wireless connection.
- Use a VPN. A VPN, or virtual private network, is designed to protect you not only from hackers, but from internet service providers. If you don’t want your ISP to sell your personal data, as they are now legally able to, a VPN encrypts your connection and hides your browsing information and personal details from even your cable company’s prying eyes.
- Check your sources. You know you should have a Wi-Fi password at home, but when you’re out in the Wild West of Wi-Fi, things aren’t always so secure. If you can’t use your mobile (LTE or 4G) connection to access the internet (a fairly safe move), it’s always best to check that the free Wi-Fi network you choose isn’t going to be dangerous. And things aren’t always what they seem. Hackers can create networks designed to trick you into thinking they’re the local library or coffee shop. Best practices? Ask. If you’re in a public place, find a business providing Wi-Fi and make sure it’s their network you’re logging onto.
The Social-Engineer Toolkit (SET) v7.6.2 released.
Arduino improvements, bug fixes, and more.
Welcome to arm0.red!