Back to Categories

CYBER SECURITY

Category

Search Keyword

Search for content with this keyword

Chunks within this category

a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
a collection of articles to look at web security risks with Javascript
a look at encryption, and it's importance in computer science and cyber security (privacy, etc)
VPN - virtual private networks and Encryption and Cybersecurity
a collection of articles and videos about How to pack for (long-term) travel
WhatsApp, Signal, Telegram (and other messaging apps) - business model
a collection of articles about Telegram and their messaging app
a collection of articles with Practical tips for protecting your Privacy (internet)
Encryption, Cybersecurity and Legal Issues, Law Enforcement
Remote working and Surveillance, Security, Privacy Issues
examining issues related to privacy, surveillance and security in the workplace
a collection of articles and videos about Surveillance and Privacy
Quantum Computing - and issues with encryption, cybersecurity
Vaccine Passports - Travel, Testing, Privacy issues and COVID19 - Coronavirus
Life360 - privacy issues and location-tracking app for parents, kids
Public WiFi hotspots - getting access to the internet while traveling - security issues
a collection of articles, videos and resources examining issues related to privacy and security at universities
a collection of articles, videos and resources examining issues related to Data, privacy and surveillance issues - examples of companies selling or leaking data
a collection of articles and videos about Surveillance and Privacy
a collection of articles exploring (possible) dystopian possibilities of City-wide surveillance cameras, AI and Privacy (internet)
a collection of articles looking at how technology is being used to enhance Elementary and Preschool Education
a collection of articles looking at how technology is being used to enhance Elementary and Preschool Education
a collection of videos and articles looking at the motivation behind creating and using the Blockchain: Risk and security challenges with using the Internet today
A collection about Blockchain, Digital Identity and Cybersecurity
A collection about Monero - Blockchain, Digital Identity and Cybersecurity
Telegram and blockchain tokens
Custody issues - Cryptocurrency Wallets - Storing Crypto assets, Bitcoin, other tokens
A collection about Blockchain, Digital Assets and Cybersecurity

Resources within this category

Article

Sleep Walking into a War – Tobias Stone – Medium

We are 10 years into a war. A war most people don’t realise is happening, and which our governments are only just beginning to see. This is the Gre... (2017)


Article

Don't Buy Anyone an Echo

Three years ago, we said the Echo was “the most innovative device Amazon’s made in years.” That’s still true. But you shouldn’t buy one. You should... (2017)


Article

How To Prevent Fraud When You Can Not Trust Your Customers

Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it). (2017)


Article

Javascript security risks? - Stack Overflow

What are the risks of using Javascript and how to avoid them? (2017)


Article

77% of 433,000 Sites Use Vulnerable JavaScript Libraries | Snyk

Last week, we released our first annual State of Open Source Security report. One of the discoveries the report mentions is that an analysis of aro... (2017)


Article

Uber Paid Hackers to Delete Stolen Data on 57 Million People

Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for mo... (2017)


Article

Application Container Security Guide - NIST

Application container technologies, also known as containers, are a form of operating system virtualization combined with application software pack... (2017)


Article

A Dare To Congress: Go Ahead, Vote A Golden Key Encryption Law!

by Jean-Louis Gassée, 2017: "With great regularity, politicians rattle their sabers at unbreakable encryption. They claim that they need a Golden ... (2017)


Article

Netflix Knows Some Very Strange Things About Public Viewing Habits

Wired Magazine, 2017: "Ever cried while watching 'Grey's Anatomy' on the subway? Netflix is on to you. Ever since smartphones got fast enough t... (2017)


Article

Inside the fake Facebook profile industry

Radio-Canada.ca: “We discovered a massive network of fake Facebook profiles used to trap victims in sextortion scams. Here's how. (2017)


Article

Equifax CEO to Congress: Not Sure We Are Encrypting Data

Wall Street Journal, 2017: "Two months after Equifax reported one of the worst data breaches in history, its interim chief executive told a congre... (2017)


Article

Senators push to ditch Social Security numbers in light of Equifax hack

TechCrunch, 2017: "Eyeing more secure alternatives to Social Security numbers, lawmakers in the U.S. are looking abroad. Today, the Senate Commer... (2017)


Article

Big Brother isn't just watching: workplace surveillance can track your every move

The Guardian, 2017: "Employers are using a range of technologies to monitor their staff’s web-browsing patterns, keystrokes, social media posts an... (2017)


Article

Rumors That Facebook Is Secretly Recording You Refuse to Die

Gizmodo, 2017: "Is Mark Zuckerberg spying on you? Oh, yes, absolutely. Is he secretly recording your voice like, all the time? Probably not. Per ... (2017)


Article

MasterCard has finally realized that signatures are obsolete and stupid

Fast Company, 2017: "For years, credit card companies have relied on an illegible squiggly line as the frontline of defense against credit card fra... (2017)


Article

It Takes Just $1,000 to Track Someone's Location With Mobile Ads

Wired Magazine, 2017: "University of Washington researchers have shown just how cheaply spies can exploit ad networks for fine-grained, individuali... (2017)


Article

How Britain Exported Next-Generation Surveillance

Medium, 2014: "Thousands of cameras, millions of photographs, terabytes of data. You’re tracked, wherever you go... BRITAIN IS ONE OF THE MOST surv... (2013)


Article

TechCrunch: website security

Restaurant guide Zomato got off lightly after a hacker grabbed 6.6M user passwords (2017)


Article

Web Developer Security Checklist

Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of life or you ha... (2017)


Article

Digital hygiene | karpathy

A guide to basic digital hygiene. This guide is a collection of the most basic digital hygiene tips, starting with the most basic to a bit more niche. (2025)


Article

Life360 Is Selling Precise Location Data on Its Tens of Millions of Users – The Markup

The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)


Article

The Missing Link Between Web2 and Web3: Custody | Future

The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)


Article

Open source security scanning platform Snyk raises $300M | VentureBeat

Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)


Article

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)


Article

Apple says photos in iCloud will be checked by child abuse detection system | Reuters

Apple Inc (AAPL.O) on Monday said that iPhone users' entire photo libraries will be checked for known child abuse images if they are stored in the ... (2021)


Article

Apple’s Mistake – Stratechery by Ben Thompson

While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)


Article

Why Denmark’s “corona passport” is more of a promise than a plan | MIT Technology Review

When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)


Article

Minneapolis police tapped Google to identify George Floyd protesters – TechCrunch

Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)


Article

These 6 browser extensions will protect your privacy online

How to reduce tracking, block ads, and encrypt all the things. (2021)


Article

What is Signal? The basics of the most secure messaging app.

With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)


Video

Equifax: Last Week Tonight with John Oliver (HBO)

LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)


Video

How Quantum Computers Break The Internet... Starting Now

A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)


Video

Quantum Computers, explained with MKBHD

Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)


Video

How Israel Rules The World Of Cyber Security, VICE on HBO, Full Episode

VICE News Published on Mar 14, 2018 U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels ... (2018)


Video

Risk and security challenges with using the Internet today: Blockchain | LinkedIn Learning (video)

Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)


Podcast

Crypto Security and the New Web3 Mindsets for Users - a16z Podcast | Podcast on Spotify

Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)


Podcast

What to Know about GDPR – a16z Podcast: Andreessen Horowitz

Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)


Website

Proton VPN: Secure, fast VPN service in 110+ countries

The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)


Website

Surfshark: secure online VPN service & more

Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)


Website

 Hacker Target. com

Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)


Website

SQLmap: automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)


Content Stats

105 Articles
5 Videos
2 Podcasts
1 Notes
4 Websites
46 Chunks