Search for content with this keyword
We are 10 years into a war. A war most people don’t realise is happening, and which our governments are only just beginning to see. This is the Gre... (2017)
Three years ago, we said the Echo was “the most innovative device Amazon’s made in years.” That’s still true. But you shouldn’t buy one. You should... (2017)
Inc.com 2017 Last week's Uber breach is only the tip of the iceberg. Standard security is broken for good (and what you can do about it). (2017)
What are the risks of using Javascript and how to avoid them? (2017)
Last week, we released our first annual State of Open Source Security report. One of the discoveries the report mentions is that an analysis of aro... (2017)
Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for mo... (2017)
Application container technologies, also known as containers, are a form of operating system virtualization combined with application software pack... (2017)
by Jean-Louis Gassée, 2017: "With great regularity, politicians rattle their sabers at unbreakable encryption. They claim that they need a Golden ... (2017)
Wired Magazine, 2017: "Ever cried while watching 'Grey's Anatomy' on the subway? Netflix is on to you. Ever since smartphones got fast enough t... (2017)
Radio-Canada.ca: “We discovered a massive network of fake Facebook profiles used to trap victims in sextortion scams. Here's how. (2017)
Wall Street Journal, 2017: "Two months after Equifax reported one of the worst data breaches in history, its interim chief executive told a congre... (2017)
TechCrunch, 2017: "Eyeing more secure alternatives to Social Security numbers, lawmakers in the U.S. are looking abroad. Today, the Senate Commer... (2017)
The Guardian, 2017: "Employers are using a range of technologies to monitor their staff’s web-browsing patterns, keystrokes, social media posts an... (2017)
Gizmodo, 2017: "Is Mark Zuckerberg spying on you? Oh, yes, absolutely. Is he secretly recording your voice like, all the time? Probably not. Per ... (2017)
Fast Company, 2017: "For years, credit card companies have relied on an illegible squiggly line as the frontline of defense against credit card fra... (2017)
Wired Magazine, 2017: "University of Washington researchers have shown just how cheaply spies can exploit ad networks for fine-grained, individuali... (2017)
Medium, 2014: "Thousands of cameras, millions of photographs, terabytes of data. You’re tracked, wherever you go... BRITAIN IS ONE OF THE MOST surv... (2013)
Restaurant guide Zomato got off lightly after a hacker grabbed 6.6M user passwords (2017)
Developing secure, robust web applications in the cloud is hard, very hard. If you think it is easy, you are either a higher form of life or you ha... (2017)
A guide to basic digital hygiene. This guide is a collection of the most basic digital hygiene tips, starting with the most basic to a bit more niche. (2025)
The app is a major source of raw location data for a multibillion-dollar industry that buys, packages, and sells people’s movements (2024)
The pathway to more widespread web3 adoption starts with familiar web2 onboarding user journeys before branching out further with with non-custodia... (2022)
Open source security scanning platform Snyk, used by developers at companies such as Google and Salesforce, has raised $300 million. The problem... (2021)
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware... (2021)
Apple Inc (AAPL.O) on Monday said that iPhone users' entire photo libraries will be checked for known child abuse images if they are stored in the ... (2021)
While it’s possible to understand Apple’s motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its... (2021)
When acting Danish finance minister Morten Bødskov announced last week that Denmark would soon launch a digital “corona passport,” the news spread ... (2021)
Civil liberties groups have criticized the use of these dragnet search warrants. The search warrant compelled Google to provide police with the ... (2021)
How to reduce tracking, block ads, and encrypt all the things. (2021)
With end-to-end encryption, disappearing messages, and no data collection, there's a lot to love about this privacy-oriented messaging app. (2021)
LastWeekTonight, 2017: "John Oliver discusses the massive impact of the cybersecurity breach at Equifax and their massively misguided attempts to m... (2017)
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. (2023)
Quantum Computers, explained with MKBHD Quantum computers aren’t what you've been told. (2023)
VICE News Published on Mar 14, 2018 U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels ... (2018)
Join Jonathan Reichental for an in-depth discussion in this video, Risk and security challenges with using the Internet today, part of Blockchain B... (2018)
Listen to this episode from a16z Podcast on Spotify. Today’s episode is all about crypto security — that is, the new mindsets and the new strategie... (2021)
Given concern around data breaches, the EU Parliament finally passed GDPR (General Data Protection Regulation) after four years of preparation and ... (2018)
The best VPN service for private browsing, fast streaming, and more. Download our free VPN now — or check out Proton VPN Plus for even more premium... (2025)
Surfshark VPN – protect your data online ● Unlimited devices ● 24/7 support ● 3200+ servers in 100 countries ● No-logs policy ● RAM-only servers, a... (2023)
Simplify the security assessment process with hosted vulnerability scanners. Online Vulnerability Scanners to map the attack surface and identify ... (2019)
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of dat... (2019)