Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • Internet hacks: Brute-force attacks and how to stop them

    Internet hacks: Brute-force attacks and how to stop them

    A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...

    Lexie 29.03.2016 6 mins
  • How much can metadata reveal? Just ask John McAfee

    How much can metadata reveal? Just ask John McAfee

    Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...

    Lexie 14.03.2016 1 mins
  • The court case that will define technology and privacy for decades

    The court case that will define technology and privacy for decades

    On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...

    Lexie 07.03.2016 10 mins
  • Guide to stronger passwords – Part 3 (Diceware)

    Guide to stronger passwords – Part 3 (Diceware)

    This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...

    Lexie 24.02.2016 4 mins
  • How to keep your messages private and anonymous

    How to keep your messages private and anonymous

    Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...

    Lexie 01.02.2016 6 mins
  • Tails 2.0 installation and review

    Tails 2.0 installation and review

    This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...

    Lexie 25.01.2016 4 mins
  • Six big data security predictions for 2016

    Six big data security predictions for 2016

    2015 was full of newsworthy cybersecurity breaches. Hackers revealed the names and credit card details of 33 million people who frequented the online-cheating website Ashley Madison. Researchers demon...

    Lexie 20.01.2016 8 mins
  • What would you give for free Wi-Fi? Probably more than you think

    What would you give for free Wi-Fi? Probably more than you think

    This post was originally published on January 13, 2016. What’s awesomer than free public Wi-Fi? When you find a free public Wi-Fi hotspot you probably think, “Awesome!” and connect to it without...

    Lexie 13.01.2016 9 mins
  • Use a VPN and save up to 50% on car rentals. We tried it!

    Use a VPN and save up to 50% on car rentals. We tried it!

    This post was originally published on November 25, 2015. Frequent flyer? You can also use ExpressVPN to find cheaper airline tickets! When booking cars online, some car rental companies and price comp...

    Lexie 25.11.2015 3 mins
  • How Flash is used to destroy your computer

    How Flash is used to destroy your computer

    Some of the most common Web viruses are ones that affect your computer by tricking you into clicking on a specific website. In fact, a whole industry exists where hackers simply upload their software ...

    Lexie 13.11.2015 2 mins
Get Started