National Cybersecurity Awareness Month

  • On ·
  • By ·

October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.

During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.

Topics include:

  • Cybersecurity at Work
  • Cybersecurity While Traveling
  • Identity Theft and Internet Scams
  • E-Skimming
  • Internet of Things
  • Multi-factor Authentication
  • Online Privacy
  • Passwords
  • Phishing
  • Protecting Your Digital Home
  • Social Media Cybersecurity

Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.

Star Labs Linux Laptops

  • On ·
  • By ·

Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed. They currently offer the Star Lite Mk II and the Star LabTop Mk III at extremely affordable prices.

The Star Lite Mk II delivers up to a 20% performance increase with an Intel® Pentium® N4200 quad-core processor and even faster SSD storage. The low power requirement of this processor and the Type II anodized aluminum chassis eliminate the need for a fan, meaning the Star Lite Mk II is virtually silent.

To the outside world, the Star LabTop Mk III is just an ordinary Linux laptop, but secretly, it is one of the fastest ultrabooks available. The new Star LabTop Mk III delivers up to a 20% performance increase with the new Intel® Core™ i7-8550u quad-core processor and even faster SSD storage. A 45.6-watt-hour battery is housed in the Type II anodized aluminum chassis allowing for a 40% increase in battery life.


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.

Little Snitch Firewall for macOS

  • On ·
  • By ·

As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t.

But you don’t notice anything, because all of this happens invisibly under the hood.

Little Snitch makes these Internet connections visible and puts you back in control of your Mac!


AntennaPod
The easy-to-use, flexible and open-source podcast manager for Android. Automatic download of new episodes and playback with variable speed. Password protected feeds and episodes. Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
The Creepy Line Documentary
“The Google policy on a lot of things is to get right up to the creepy line and not cross it.” – former Google CEO Read more.
Blue Yonder Travel Hoodie
The Blue Yonder Hoodie provides first-class comfort that thwarts identity theft. When your destination is 500 miles and a muddy field away from home, count Read more.
Blokada Mobile Ad Blocker
Ad blocker for Android and iOS: free and open source. If you want to efficiently block ads, trackers, malware, save on your data plan, speed Read more.
Disroot
Disroot is a platform providing online services based on principles of freedom, privacy, federation and decentralization. No tracking, no ads, no profiling, no data mining! Read more.
Extreme Privacy
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from Read more.
GrapheneOS
GrapheneOS is an open source privacy and security focused mobile OS with Android app compatibility. It’s focused on the research and development of privacy and Read more.
Telegram Messenger
Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed. Connect from the most remote locations. Coordinate groups of Read more.
Lokinet: Private Internet Browsing
Privately Access Censorship Resistant Websites Service Nodes on the Loki network will operate a low latency onion routing protocol, forming a fully decentralised overlay network, Read more.
Silent Pocket Passport Wallet
The Silent Pocket RFID Blocking Passport Wallet is your confidant in any global adventure. As a pilot, global vagabond or just in and out of Read more.
NSA Guidance on Location Data
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for Read more.
SimpleLogin
Don’t lose your email to spammers. Protect your email address and take control of your mailbox with email alias. Or create your business emails using Read more.
3M Gold Privacy Filters
The gold standard in privacy. Help keep your confidential information private with the stylish 3M™ Gold Privacy Filter that offers greater clarity and a sharper Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
NCrypt Anonymous SIM Cards
On-device security only goes so far. The modern-day telco’s SIM cards usually have unrestricted access to your data, call logs and internet history. All of Read more.
Mumble
Mumble is a free, open source, low latency, high quality voice chat application. Mumble is primarily intended for gamers, and was the first to establish Read more.
The Path to Privacy: Stopping Face Surveillance in California
Surveillance technology vendors are already using this moment to promote surveillance products, even when they do more harm than good. Face recognition systems endanger the Read more.
Winston Privacy Filter
Protect your family from online spying and identity theft with Winston’s VPN alternative. Winston is a hardware filter that protects your privacy online. Winston strips Read more.
Octopus: Truly Decentralised Identity
Octopus.sh is a unique company offering market-leading identity management technology. The Artefacts Exchange Hub stores and protects all personally identifiable information. Build unique Personas, identities Read more.
ThreatWire
ThreatWire is your source forsecurity, privacy, and internet freedom news! ThreatWire by Hak5 launched in 2012 as a quick weekly dose of news about security, Read more.
BoringPhone
The BoringPhone is a minimalist smartphone with all the useful stuff, none of the distractions. The BoringPhone trims away the distractions leaving just the useful Read more.
Mic-Lock Microphone Blocker
When hackers, companies, or governments gain remote access control of your laptop, tablet or smartphone, they’re able to turn on the webcam—an action that causes Read more.
Jitsi Video Conferencing
Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are Read more.
Session Messenger
Session is an end-to-end encrypted messenger that removes sensitive metadata collection, and is designed for people who want privacy and freedom from any forms of Read more.
The Value of Your Personal Data Documentary
The personal data that is being collected by internet companies large and small has turned into a goldmine. The applications for this enormous mountain of Read more.
Hushed: Private Disposable Phone Numbers
Since 2013, hushed has offered low cost private numbers for talk and text in 45 countries. Their goal is to provide private mobile telecommunications options Read more.
Weapons of Mass Surveillance Documentary
The digital age has heralded a new unprecedented means of surveillance, and as more of our personal information goes online, more of our lives are Read more.
Light Phone 2
A phone is a tool, and it should serve you as the user, not the other way around. The Light Phone II is a phone Read more.
Data Detox Kit
Data Detox Kit shows users everyday steps you can take to control your digital privacy, security, and wellbeing in ways that feel right to you. Read more.

Nextcloud

  • On ·
  • By ·

Your cloud, your rules!

Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at home, at one of our providers or in a data center you trust.

Nextcloud gives you access to all your files wherever you are. Where are your photos and documents? With Nextcloud you pick a server of your choice, at home, in a data center or at a provider. And that is where your files will be. Nextcloud runs on that server, protecting your data and giving you access from your desktop or mobile devices.

Through Nextcloud you also access, sync and share your existing data on that FTP drive at school, a Dropbox or a NAS you have at home. Nextcloud is free, open source and you can get involved in making it better!


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.

Darter Pro Linux Laptop by System76

  • On ·
  • By ·

The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and up to 32GB RAM.

The long battery
life allows you to bring your personal office on a remote-work
excursion and remove outlets from your sightseeing list. Travel light
with the ultra-thin, featherweight chassis that won’t weigh you
down. Enjoy the vivid graphics, crisp text, and true-to-life color
that breathe life into Darter Pro’s 15.6″ Matte IPS display.

Take advantage of a
versatile arrangement of ports, such as an SD card slot and
microphone jack that are perfect for content creators. An HDMI and
Mini DisplayPort bring you from desk to conference room seamlessly,
and a variety of different ports will keep you armed for any
scenario.

System76 Laptops run
on Pop!_OS which is a Linux distribution designed for professionals
and is easy to use making the transition from Windows or Mac
extremely easy. Pop!_OS features automatic firmware updates on
System76 laptops helping keep your pc secure and reliable.

Pop!_OS encrypts
your installation by default and is the only distro that enables
full-disk encryption out-of-the box from System76. Pop!_OS does not
collect or store any information from user installations. Minimal OS
and hardware version data is used (but not stored) to provide
firmware and software updates and connectivity verification.


Aegis Authenticator
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an Read more.
National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have Read more.
Star Labs Linux Laptops
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint Read more.
Samsung T7 Touch Portable SSD
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package. Keep your Read more.
Keywallet Touch Cryptocurrency Wallet
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to Read more.
MUDI 4G Router
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure Read more.
Token2 Programmable Security Token
The Token2 miniOTP card is a hardware alternative to Google Authenticator or other OATH-compliant software tokens. It works with authentication systems that support TOTP tokens: Read more.
Little Snitch Firewall for macOS
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to Read more.
Bitwarden Password Manager
Password theft is a serious problem. The websites and apps that you use are under attack every day. Security breaches occur and your passwords are Read more.
Qkey Password Vault
Qkey is a patented security key with an enhanced microchip that secures your online payment transactions combined with an electronic password keeper function which safely Read more.
Ledger Nano X Cryptocurrency Hardware Wallet
The Ledger Nano X is a Bluetooth enabled secure device that stores your private keys. Make sure all your crypto assets are safe, wherever you Read more.
Slate Gigabit Travel Router
It’s often for a frequent traveler to use Wi-Fi in public places. The problem with public Wi-Fi is that you are inviting a whole host Read more.
Cyber War Documentary
As we’ve transported our valuable and secret information online we have inadvertently exposed our private lives to hackers. Hackers pose a universal threat, targeting everything Read more.
Dataram QBKEY
QBKEY is a portable biometric device that can safely and easily secure any type of data, anywhere, anytime. It provides everybody with an easy-to-use & Read more.
diskAshur PRO2 Encrypted Hard Drive
The diskAshur PRO2 is an easy to use, ultra-secure, PIN authenticated, portable USB hard drive with real-time AES-XTS 256-bit hardware encryption, software free design, super-fast Read more.
Nano S Cryptocurrency Hardware Wallet
Protect your crypto assets with the most popular hardware wallet in the market. The Ledger Nano S supports over 25 cryptocurrencies, including Bitcoin, Ethereum, Ripple Read more.
CUJO AI Smart Internet Security Firewall
CUJO AI smart firewall protects your computers and IoT devices against malware, ransomware, viruses, and other hacking threats. Think of it as advanced antivirus for Read more.
Nextcloud
Your cloud, your rules! Nextcloud puts your data at your fingertips, under your control. Store your documents, calendar, contacts and photos on a server at Read more.
GRYPHON WiFi Router
Hack Protection w/AI-Intrusion Detection & Malware Protection, Smart Mesh Wireless System w/App UNMATCHED PROTECTION & SECURITY24/7 protection while you sleep, Daily security updates to prevent Read more.
Everykey
Everykey is a Bluetooth device that replaces your keys and passwords. Using military grade security, Everykey can be used to unlock your phone, laptop, tablet, Read more.
Duo Two-Factor Authentication App
Easy, One-Tap Authentication Logging in securely is fast and easy with Duo Push, the more secure method of two-factor authentication supported by Duo Mobile. Users Read more.
KeePassXC Password Manager
Encrypted – The complete database is always encrypted with the industry-standard AES encryption algorithm using a 256 bit key. KeePassXC uses a database format that Read more.
Bitdefender Box
Meet the Bitdefender BOX. It’s the single security solution for all your Internet-connected devices. Double-Clad Home Network Security: Block malware, stolen passwords, identity theft and Read more.
Click Here to Kill Everybody
A world of “smart” devices means the Internet can kill people. We need to act. Now. Everything is a computer. Ovens are computers that make Read more.
Thetis FIDO U2F Security key
Thetis FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB Read more.
Securifi Almond
Almond is a device that brought touch to Wireless Routers for the first time. Users can setup & maintain their router easily from its highly Read more.
Darter Pro Linux Laptop by System76
The Darter Pro by System76 offers an exceptional battery life, thin and lightweight chassis, 15.6″ Matte IPS Display, 8th-Gen Intel Core i5 and i7, and Read more.
YubiKey 5 NFC
The YubiKey 5 NFC is the world’s most protective security key that works with more online services and applications than any other security key. Usernames Read more.
Mojave Faraday Travel Case
Mojave Travel Case by Mission Darkness is designed for personal security, travel protection, EMP protection, and anti-hacking/anti-tacking/anti-spying assurance. The perfect solution for protecting your phone Read more.
Trezor One Cryptocurrency Wallet
TREZOR One is among the most trusted and ubiquitous hardware wallets in the world. It offers unmatched security for cryptocurrencies, password management, second-factor authentication, while Read more.