Lexie

Lexie

Lexie is the blog's resident tech expert and gets excited about empowerment through technology, space travel, and pancakes with blueberries.

  • Internet hacks: Phishing and spearphishing explained

    Internet hacks: Phishing and spearphishing explained

    Phishing, pronounced fishing, is a social engineering technique designed to steal passwords, credit card details, and other sensitive information. The ultimate goal is to use these credentials to gain...

    Lexie 23.05.2016 4 mins
  • Do I need antivirus on my computer?

    Do I need antivirus on my computer?

    Tl;dr: No, antivirus software no longer reliably protects against malware threats. To understand why, read below about the history of malware, what antivirus software does, and whether you truly need ...

    Lexie 11.04.2016 6 mins
  • What the Panama Leak means for corruption and privacy

    What the Panama Leak means for corruption and privacy

    Last Sunday (April 3, 2016) the International Consortium of Investigative Journalists (ICIJ) and the Sueddeutsche Zeitung (SZ) released the Panama Papers to media outlets around the world. The Panama ...

    Lexie 06.04.2016 8 mins
  • Internet hacks: Brute-force attacks and how to stop them

    Internet hacks: Brute-force attacks and how to stop them

    A brute-force attack, also called exhaustive key search, is essentially a game of guessing and can be executed against any type of authentication system. Encryption keys are particularly vulnerable to...

    Lexie 29.03.2016 6 mins
  • How much can metadata reveal? Just ask John McAfee

    How much can metadata reveal? Just ask John McAfee

    Metadata can often reveal more about a file than the actual data. A 2012 manhunt illustrates this point. The case concerned John McAfee, famous for the antivirus company named after him and for being ...

    Lexie 14.03.2016 1 mins
  • The court case that will define technology and privacy for decades

    The court case that will define technology and privacy for decades

    On December 2, 2015, the married couple Syed Rizwan Farook and Tashfeen Malik shot and killed fourteen people at a training event for the Department of Health in San Bernardino, California, where Faro...

    Lexie 07.03.2016 10 mins
  • Guide to stronger passwords – Part 3 (Diceware)

    Guide to stronger passwords – Part 3 (Diceware)

    This is Part 3 of our stronger password series. For the other parts, click below: Part 1 (Two-factor authentication) Part 2 (Password managers) Generate secure and memorable passwords with Diceware If...

    Lexie 24.02.2016 4 mins
  • Guide to stronger passwords, Part 2 (password managers)

    Guide to stronger passwords, Part 2 (password managers)

    This is Part 2 of our stronger password series. For the other parts, click below: Part 1 (Two-factor Authentication) Part 3 (Diceware) In Part 1 of our Guide to Stronger Passwords, we explained two-fa...

    Lexie 15.02.2016 3 mins
  • How to keep your messages private and anonymous

    How to keep your messages private and anonymous

    Keeping your chats private can be an arduous and tiring task. And trying to keep them anonymous can be very daunting. Yet our chats contain some of our most sensitive pieces of information - we often ...

    Lexie 01.02.2016 6 mins
  • Tails 2.0 installation and review

    Tails 2.0 installation and review

    This post was originally published on January 25, 2016. One of the major barriers Edward Snowden faced when preparing the most extensive leak of classified documents in modern history was teaching Gle...

    Lexie 25.01.2016 4 mins
Get Started