On March 24, 2017, the US Senate passed the broadband privacy law, authorizing broadband providers to sell users’ browsing data without their consent. Yesterday, the US House of Representatives voted similarly to overturn FCC’s internet protections for consumers.
How can we protect our privacy in the face of this? There are thousands of tools, with both defensive and offensive security capabilities, to help internet users protect their privacy and data from the clutches of cyber attackers and to keep their activities private from their ISP and mass surveillance by the government.
To stay safe from these surveillance, I have handpicked 10 security & privacy tools which can help you protect your personal information.
GNU Privacy GuardThe GNU Privacy Guard or GPG is a tool used for files as well as email encryption. Why do you need this? This tool encrypts your data and makes it useless for anyone monitoring or stealing your information. GPG can be freely used, modified and distributed under the terms of the GNU General Public License. This is a viable open-source alternative to PGP or Pretty Good Privacy. It complies with OpenPGP standards.
BitLockerBitLocker is a full disk encryption feature included with Windows Vista and later versions. It is designed to protect data by encrypting entire volumes.
AxCryptAxCrypt is the leading open-source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files.
PureVPNPureVPN is the best encryption VPN to help you protect and safeguard your data from falling into the wrong hands. It creates a secure tunnel between your computer and the internet, encrypting the data you transmit with up to 256-bit military-grade encryption. With PureVPN on your side, no data sniffer can penetrate the web of security surrounding you.
Security & Vulnerability Scanning Tools
NMapNmap (Network Mapper) is free open-source utility software for network discovery and security auditing. It is the most powerful open-source port scanner, used to discover open ports and services that are spying on you via internet-connected systems. With this port scanning tool, you can detect vulnerabilities and misconfigurations. Not only this, you can also get security-related information about any network services.
NessusNessus is the world’s most popular vulnerability scanner developed by Tenable Network Security. It is the world’s most widely deployed vulnerability and configuration assessment product.
OpenVASOpenVAS is a framework of several services and tools offering intensive vulnerability scanning as well as providing powerful vulnerability management solutions. Vulnerability management can be added to patch and for configuration management, plus it includes antivirus software for blocking and destroying malware.
Penetration Testing Tools
MetasploitMetasploit Framework is a penetration testing tool to help you remain protected against intrusions by monitoring exploits. It has modules that not only include exploit testing, but also scanning and auditing features.
ParosParos is a valuable testing tool for security and vulnerability testing. It is a Java-based web proxy for assessing vulnerabilities in web applications. Paros can be used to crawl your entire site, and then execute canned vulnerability scanner tests. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web-based attacks such as SQL injection and cross-site scripting.
Anti-Spymail Security Tool
MailControlMailControl allows companies to block spymail from hitting their inbox. It is an especially effective tool to prevent targeted phishing attacks from reaching businesses and enterprises. It disables hidden tracking codes in incoming emails to reduce your legal risk and strengthen your cyber security. It helps to protect confidential information and safeguard employee privacy.
The above mentioned tools will not only protect your personal data, they will also help you to secure your systems and networks.
Editor’s Note: The opinions and recommendations expressed in this guest blog are solely those of the contributor, and do not necessarily reflect those of The Security Awareness Company, LLC.