How to hide your online activity from an Internet Service Provider

How to hide your online activity

Once upon a time, the web was sold to us as a place of anonymity, where we could assume whatever identity we pleased, and where our activity was known only to ourselves. However, now we know better. As things have turned out, the internet is one of the most public places in the world. From government agencies organizing mass surveillance, to cybercriminals seeking your personal details and marketers trying to understand every action you take, eyes seem to be everywhere. But few of those viewers have the range of vision…

Read More

How to Quickly Read a TOS Document

How to read a TOS Document

You’ve certainly agreed to terms of service (TOS) documents at some point in your life. Whether or not you’ve actually read them is a whole different story. In fact, a recent study showed that essentially no one reads TOS agreements. This became clear when researchers added a section to a TOS document that said the signee would have to give up their first born child! Luckily for the people involved, it wasn’t a real contract. Of course no one wants to read through thousands of words of legal mumbo jumbo.…

Read More

IMB’s unique mobile cybersecurity training center is a first in the industry

IBM X-Force Command Cyber Tactical Operations Center - Mobile Cybersecurity Facility

IBM has launched its X-Force Command Cyber Tactical Operations Center. A mobile cyber security training operations center has been launched by IBM Security. Known as the X-Force Command Cyber Tactical Operations Center (C-TOC), the mobile security unit will travel around the United States and Europe for the purpose of running incident drills with clients, according to an IBM press release. The mobile training center will provide on-demand cybersecurity support and build cybersecurity awareness. The first-of-its-kind, fully operational mobile cybersecurity facility is literally a travelling training center on wheels, housed in…

Read More