Latest Blog Posts
Going Incognito is a phrase that has been popularized by Google with reference to their Chrome browser. The feature was added as a response to those wanting more online privacy features built into ...
Every day we learn of new ways that cyber criminals are infecting computers and stealing from unsuspecting people. One of the latest trends has been “Malvertising”. Basically, this is MALware + ...
What were you doing on New Year’s Eve? Well, I’m sure you had plans. Parties, fireworks, champagne, and New Years resolutions were probably a must. So if you were partying it up on that night, you ...
The new year is upon us and we at ICLOAK.org would like to wish all our readers, customers and supporters a great year ahead. Because we know you probably have some new year resolutions you are cu ...
Cookies. That’s the dirty word that big data keeps trying to reinvent. Why? Because it’s what data farms use to harvest information/ data about web users as they compile profiles for marketers and ...
Internet privacy seems to be on a slow journey to zero. The recent leak of hundreds of nude celebrity photos, no less leaked from iCloud, one of the more secure cloud storage platforms, seems to h ...
The government has just declared that because “it’s just metadata”, then it’s okay for them to collect your data without your consent. According to responses filed in the Klayman v. Obama case whe ...
The ICLOAK Kickstarter closed some weeks back and did so with a big bang. We are totally amazed at the support and backing we have received from such a sizable community numbering upwards of 1,800 ...
Technology vulnerabilities are the seedbed from which viruses and all manner of malicious software are sprouted. The concept behind technology itself, which is anchored in human effort, means that ...