More stories

  • in

    Patch now: Serious Linux kernel security hole uncovered

    isak55 — Shutterstock Just what every Linux system administrator wants just before the holidays: A serious Linux kernel security bug. The Zero Day Initiative (ZDI), a zero-day security research firm, announced a new Linux kernel security bug. This hole allows authenticated remote users to disclose sensitive information and run code on vulnerable Linux kernel versions.  […] More

  • in

    How to upgrade Opera connections from HTTP to HTTPS

    iStockphoto/Getty Images You’ve certainly heard of HTTP. Every web address starts with HTTP. Once upon a time, you had to type the HTTP for addresses. Now, you can just type www.zdnet.com and everything works as expected. More how-tos But did you know that HTTP isn’t the only protocol? There’s also HTTPS, which is the secure […] More

  • in

    The 5 best VPNs for school of 2023

    Tech Specs: Number of servers: 1,700+ | Number of server locations: 60+Plan typeCost2 years$4.99/mo.1 year$5.99/mo.1 month$9.99/mo.If you’re on a strict budget, ProtonVPN offers a free VPN service for school. There are versions of ProtonVPN you can pay for with the above pricing structure, or you can opt for the free version. It uses an encrypted VPN tunnel to keep information safe while hiding your browsing history with a 10-Gbps server network. One unique feature is ProtonVPN’s ability to protect against Internet censorship, allowing you to access any websites you want. There is also the VPN Accelerator that delivers up to a 400% increase in VPN speeds to quickly get you what you need. Read the review: ProtonVPN review More

  • in

    Google brings client-side encryption to Gmail for Workspace

    Image: Getty Images/iStockphoto Google is rolling out what it calls client-side encryption (CSE), giving Workspace customers the ability to use their own encryption to shield their data before it reaches Google’s servers.  With client-side encryption (CSE) enabled, the email body, attachments, and inline images are encrypted. The email header, subject, timestamps, and recipients lists are […] More

  • in

    14 odd and interesting gift ideas for hackers in 2022

    There is a misconception that all hacking is illegal. However, hacking is simply identifying weaknesses in a device — whether it is a PC, smartphone, or another physical object — and software, including apps, and attempting to exploit them.This could include a computer network, old tech equipment, or a website’s backend control system. Hacking, in itself, doesn’t automatically mean unauthorized entry. There are companies out there that ask for ethical hackers to test their software for weaknesses and will reward them financially for their findings.It is only when a hacker uses their skills for unauthorized and criminal purposes, theft, or destruction that it becomes illegal. This could include breaking into a network to deploy malware or stealing confidential information. More

  • in

    What is VPN split tunneling and should I be using it?

    There are three main types of split tunneling: URL-based, app-based, and inverseURL-based split tunneling targets traffic being routed to specific URLs, encrypting only that traffic. This type of setup could be configured to encrypt all traffic directed toward your bank’s website, your office’s sign-in and HR pages, or your medical providers’ portal. Any traffic tied to a specific URL can be filtered in this way, while traffic to any unspecified URLs remains on your standard connection. Many VPNs offer a browser extension to help users set which URLs will be encrypted.App-based split tunneling is nearly identical to the URL-based variety, but it filters the traffic of specific apps, rather than specific URLs. A few coordinating examples would be logging into your bank’s mobile app, accessing your company’s Slack, or using your medical insurance providers’ telehealth software. An app-based split tunneling setup will encrypt any traffic associated with those apps, while less sensitive data, like your TikTok scrolling, would stay unencrypted. It’s particularly useful for use with mobile device VPN installations.Inverse split tunneling is best for people that want nearly all of their traffic encrypted. The above two options leave your traffic unencrypted unless you specifically add it to their encryption lists. Inverse split tunneling does the opposite by encrypting everything on your system by default. Anything you don’t want encrypted will then need to be specified. To continue the above examples, your banking, work, and medical traffic would automatically be encrypted, while your TikTok activity would need to be manually set to use an unencrypted connection.  More