Latest News Feed
Orlando-based privacy and security tech startup ICLOAK Inc. today announced the launch of its second generation ICLOAK Stik online privacy and anonymity device. The second generation device follows the successful development, launch and sale of the first generation ICLOAK Stik device, which has been in operation since July of 2014.
ICLOAK™ Stik helps you hide from prying eyes online. A portable anonymity tool which turn any PC or Mac into a secure computer and defeats all known threats when ICLOAK Stik is used to restart a computer. When you are done using ICLOAK Stik it simply leaves NO TRACE of your use on the computer.
This infographic includes quotes from Internet security experts on their thoughts on how to protect kids who use the Internet. These are anecdotal things they both practice and advocate for.
Cyber security is one of the most important issues on the planet right now. People are storing more and more of their most vital information on their computers, and many people are operating their businesses on the Internet. Unfortunately, as more and more people are moving their lives onto the Internet, major holes are beginning to develop concerning users’ cyber security throughout the country. One of the biggest security risks to emerge on the Internet today is Windows Server 2003. Windows Server 2003 was one of the most important web servers on the Internet for many years, but recently Microsoft … Continued
Everyday people trust the government with some of the most important information in their lives. This information covers a wide range of different subjects from income, to social security information, and even your crime record. One of the biggest stores of this information at the government level is at the I.R.S. The I.R.S. keeps information on every American taxpayer and until recently most people believed that this information was extremely secure. Recently, hackers were able to get into the I.R.S. accounts of more than 300,000 American households. While people might expect this hacking to have occurred using top secret hacking … Continued
For several years, people have had questions about the way that the NSA operates in order to protect American lives. In particular, people had major questions about the relationship that the NSA has with telecommunications companies. Recently, the NSA decided to reveal some of the secrets behind their relationship with telecommunications companies. The agency chose to do this by release a huge amount of documents that are meant to shed light on their relationship with telecommunications companies. These documents revealed a great deal about the way that the agency has interacted with AT&T in particular. After the attacks on September … Continued
First… a Full Disclosure I usually have someone on our staff write these monthly updates and then I review them and add/remove/edit content and then approve it to be sent off to you. This month is different. I have some REALLY IMPORTANT INFORMATION which I want to share with you and I hope you to read this entire message to learn how you can help us make ICLOAK even better for you. As a THANK YOU for reading through this long newsletter, I have buried a special discount code in this message that you can use or share with friends … Continued
Two new features to the Windows 10 operating system could potentially eliminate the cyber world’s hacking problem. They could ultimately follow Bill Gate‘s prediction in 2004 of the death of passwords through the creation of an online security and authentication system that will no longer require the use of passwords. The combination of passwords and usernames have been the primary authentication choice since the cyber world began its ascent into everyone’s life. It provides a sense of security and a convenient option for users. However, it also provides a way for some with ulterior motives to access a user’s private data. … Continued
For years, advertising companies have been tracking user’s website browsing habits without their consent. Most of the time, users are unaware that they are even being tracked by several different companies at the same time. Even more so, when a user does discover that they are being tracked, simply changing their browser settings will not prevent them from being tracked. There are companies that even offer users an Opt-out option that they essentially believe will prevent companies from tracking them. Unfortunately, this is often a tactic that merely hides the signs and symptoms of being tracked. For a while now, … Continued
Japanese researchers have officially announced the launch of a privacy visor to be used to confuse facial recognition software found in social networks, surveillance cameras, and other types of facial tracking hardware. Surveillance is a common phenomenon these days, especially in the West. For instance, there is at least on security camera per 11 citizens in the UK alone. They are found virtually everywhere including the street, stores, tracking cookies online, GPS applications, and government programs. It is impossible to avoid being tracked in those special areas, making spying and surveillance a real menace to society. As it is a violation of privacy … Continued
Privacy is a sacred element for many people, especially on the web. You probably want to relax and know that you can surf the Internet on your own time without having your activities broadcast to an uninvited third-party lurker. Privacy Badger, by the EFF is the latest online privacy tool to hit the Internet. The Chrome extension will be of great service to you if you’re looking to solidify your online privacy. The following are three ways that Privacy Badger can help you protect your private data online: 1. Detects and Deflects Invisible Trackers Various advertising companies install invisible trackers to keep track … Continued
In a press release published yesterday, the EFF, privacy company Disconnect together with a coalition of Internet companies announced that it has released a new Do Not Track standard for web browsers. This new browser setting is “a new policy standard that, coupled with privacy software, will better protect users from sites that try to secretly follow and record their Internet activity, and incentivize advertisers and data collection companies to respect a user’s choice not to be tracked online.” This comes on the heels of a growing clamor for Internet companies to stop secretly tracking web users and collecting their data … Continued
Now more than ever, we live in a world of data. Our personal information has become one of the hottest commodities of the Internet Age. Marketers fight for demographic data, purchase history data, personal interest data, and any data at all that might help them convince us to purchase their products. Social media platforms and search engines have made their fortune on selling our data to these marketers so they can target ads to our specific characteristics. On the one hand, this has sparked a massive online privacy movement that has pressured major Internet companies to create binding privacy policies … Continued
Going Incognito is a phrase that has been popularized by Google with reference to their Chrome browser. The feature was added as a response to those wanting more online privacy features built into ...
Every day we learn of new ways that cyber criminals are infecting computers and stealing from unsuspecting people. One of the latest trends has been “Malvertising”. Basically, this is MALware + ...
What were you doing on New Year’s Eve? Well, I’m sure you had plans. Parties, fireworks, champagne, and New Years resolutions were probably a must. So if you were partying it up on that night, you ...
The new year is upon us and we at ICLOAK.org would like to wish all our readers, customers and supporters a great year ahead. Because we know you probably have some new year resolutions you are cu ...
Cookies. That’s the dirty word that big data keeps trying to reinvent. Why? Because it’s what data farms use to harvest information/ data about web users as they compile profiles for marketers and ...
Internet privacy seems to be on a slow journey to zero. The recent leak of hundreds of nude celebrity photos, no less leaked from iCloud, one of the more secure cloud storage platforms, seems to h ...
The government has just declared that because “it’s just metadata”, then it’s okay for them to collect your data without your consent. According to responses filed in the Klayman v. Obama case whe ...
The ICLOAK Kickstarter closed some weeks back and did so with a big bang. We are totally amazed at the support and backing we have received from such a sizable community numbering upwards of 1,800 ...
Technology vulnerabilities are the seedbed from which viruses and all manner of malicious software are sprouted. The concept behind technology itself, which is anchored in human effort, means that ...