Protection against scams, social engineering, network security, to modifying and circumventing restrictions. From enterprise to personal.
Brian Krebs’s long-running investigative blog on cybercrime, data breaches, and security trends.
Bruce Schneier’s commentary on security theory, cryptography, and policy.
In-depth news, analysis, and opinion across all cybersecurity domains.
Independent news site focusing on malware, IoT risks, and enterprise threats.
Breaking news and expert commentary on global security incidents and defenses.
Tech-support–style news, malware removal guides, and security tool reviews.
Accessible security news, threat research, and opinion from Sophos experts.
Updates on Windows/Cloud threats, defensive features, and best practices from MSRC.
In-depth malware analyses and cyber-espionage investigations by Kaspersky Lab.
Posts on new malware, security tips, and privacy guides.
Archive of public exploits and vulnerability-proof-of-concept code.
Large community forum discussing security exploits, social engineering, and reverse engineering.
Daily Threat Monitor logs and diary posts tracking global security events.
An open-source, cross-platform password manager with end-to-end encryption and self-hosting options.
A free, offline password manager storing credentials in a locally encrypted database file.
A free, offline password manager storing credentials in a locally encrypted database file.
Provides a secure, cross-platform, and open-source password management solution that stores passwords locally, ensuring privacy and control without cloud reliance. It offers features like auto-fill for applications.
A stateless password manager that generates unique passwords on-the-fly without storing them anywhere.
Provides a comprehensive list of recommended software, services, and practices designed to help users protect their digital privacy and security from surveillance.
EFF’s threat-modeling guide with step-by-step tutorials on using secure tools and defending your privacy.
Provides cybersecurity news and in-depth resources from industry experts.
An open-source project offering installation instructions and recommendations for privacy-focused tools.
A search engine that doesn’t track your searches or store personal information and enforces encryption.
Offers a secure messaging experience with a strong emphasis on user privacy. It provides essential communication features while prioritizing secure and private interactions.
A live operating system that routes all network traffic through Tor and leaves no digital trace on the host.
A security-oriented, free and open-source operating system for personal computers that enables secure A security-focused OS using Xen virtualization to isolate applications in separate, disposable VMs touted as a “reasonably secure operating system"
Provides an open-source, hardened Linux distribution designed to anonymize online activities and enhance internet privacy.
A peer-to-peer file synchronization tool encrypting data in transit with no central server required.
It informs users about the discontinuation of a specific security tool, advising on native browser features for securing web connections. The page details the advancements made in web encryption.
An EFF tool for testing your browser’s resistance to fingerprinting and identifying tracking vulnerabilities.
Provides tools and educational content to visualize, analyze, and improve email authentication protocols like DMARC, SPF, and DKIM. It includes a tester, a quiz, and an email header analyzer.
Provides secure, randomly-generated virtual card numbers to shield financial information and protect against credit and debit card fraud, with spend limits that can be set for one-time or repeating. Right-to-repair advocate Louis Rossmann endorsed.