The Intersection of Privacy and Cybersecurity

avoidthehack promotes privacy and cybersecurity for all users.


Get started

Latest Posts

.

Most browsers have the "Do Not Track" feature in their settings. You might have this setting enabled or you might not.

But what does "Do Not Track" really do? Does it do what the name implies? Does it matter if it is even enabled or not? You might be shocked at the answers...

...

Read More...

Avast's "Secure browser" has been around for a while now.

Once a bundled feature with the premium version of its famous antivirus, Avast's Secure Browser is now a (free) standalone product.

Of course, the question of just how "secure" and "private" this browser truly is remains to be seen.

Let...

Read More...

Memory capacity for everyone is limited. Remembering stuff seems to get harder and harder every day, doesn't it?

But you commit some things to memory right?

I recommend committing a couple passwords to memory too. Not many, really. Only a coupl...

Read More...

Credential stuffing and brute force attacks are two common cyberattacks used to crack passwords and gain access to user accounts/information.

We're going to explore what credential stuffing and brute force attacks are and how they work.

Additionally we'll go over some tips for the best ways to...

Read More...

I'M FEELING LUCKY

(Will take you to a random post)